May 10 00:42:12.008041 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 00:42:12.008069 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:42:12.008083 kernel: BIOS-provided physical RAM map: May 10 00:42:12.008093 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 10 00:42:12.008102 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved May 10 00:42:12.008111 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable May 10 00:42:12.008125 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved May 10 00:42:12.008135 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data May 10 00:42:12.008145 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS May 10 00:42:12.008155 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable May 10 00:42:12.008165 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable May 10 00:42:12.008175 kernel: printk: bootconsole [earlyser0] enabled May 10 00:42:12.008184 kernel: NX (Execute Disable) protection: active May 10 00:42:12.008194 kernel: efi: EFI v2.70 by Microsoft May 10 00:42:12.008210 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 May 10 00:42:12.008220 kernel: random: crng init done May 10 00:42:12.008231 kernel: SMBIOS 3.1.0 present. May 10 00:42:12.008242 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 May 10 00:42:12.008253 kernel: Hypervisor detected: Microsoft Hyper-V May 10 00:42:12.008263 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 May 10 00:42:12.008273 kernel: Hyper-V Host Build:20348-10.0-1-0.1827 May 10 00:42:12.008284 kernel: Hyper-V: Nested features: 0x1e0101 May 10 00:42:12.008298 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 May 10 00:42:12.008308 kernel: Hyper-V: Using hypercall for remote TLB flush May 10 00:42:12.008321 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns May 10 00:42:12.008335 kernel: tsc: Marking TSC unstable due to running on Hyper-V May 10 00:42:12.008348 kernel: tsc: Detected 2593.905 MHz processor May 10 00:42:12.008361 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 00:42:12.008372 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 00:42:12.008382 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 May 10 00:42:12.008393 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 00:42:12.008403 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved May 10 00:42:12.008415 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 May 10 00:42:12.008426 kernel: Using GB pages for direct mapping May 10 00:42:12.008436 kernel: Secure boot disabled May 10 00:42:12.008447 kernel: ACPI: Early table checksum verification disabled May 10 00:42:12.008458 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) May 10 00:42:12.008469 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:42:12.008480 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:42:12.008491 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) May 10 00:42:12.008509 kernel: ACPI: FACS 0x000000003FFFE000 000040 May 10 00:42:12.008521 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:42:12.008533 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:42:12.008546 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:42:12.008558 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:42:12.008571 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:42:12.008586 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:42:12.008598 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:42:12.008611 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] May 10 00:42:12.008624 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] May 10 00:42:12.008636 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] May 10 00:42:12.008648 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] May 10 00:42:12.008661 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] May 10 00:42:12.008673 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] May 10 00:42:12.008688 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] May 10 00:42:12.008701 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] May 10 00:42:12.008714 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] May 10 00:42:12.008726 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] May 10 00:42:12.008739 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 10 00:42:12.008751 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 10 00:42:12.008764 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug May 10 00:42:12.008776 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug May 10 00:42:12.008789 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug May 10 00:42:12.008803 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug May 10 00:42:12.008815 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug May 10 00:42:12.008828 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug May 10 00:42:12.008841 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug May 10 00:42:12.008853 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug May 10 00:42:12.008865 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug May 10 00:42:12.008877 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug May 10 00:42:12.008890 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug May 10 00:42:12.008902 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug May 10 00:42:12.008917 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug May 10 00:42:12.017961 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug May 10 00:42:12.017978 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug May 10 00:42:12.017992 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug May 10 00:42:12.018004 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] May 10 00:42:12.018016 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] May 10 00:42:12.018029 kernel: Zone ranges: May 10 00:42:12.018054 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 00:42:12.018064 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 10 00:42:12.018077 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] May 10 00:42:12.018087 kernel: Movable zone start for each node May 10 00:42:12.018096 kernel: Early memory node ranges May 10 00:42:12.018104 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 10 00:42:12.018112 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] May 10 00:42:12.018121 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] May 10 00:42:12.018130 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] May 10 00:42:12.018139 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] May 10 00:42:12.018146 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:42:12.018158 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 10 00:42:12.018166 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges May 10 00:42:12.018174 kernel: ACPI: PM-Timer IO Port: 0x408 May 10 00:42:12.018181 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) May 10 00:42:12.018191 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 May 10 00:42:12.018200 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 10 00:42:12.018208 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 00:42:12.018215 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 May 10 00:42:12.018225 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 10 00:42:12.018237 kernel: [mem 0x40000000-0xffffffff] available for PCI devices May 10 00:42:12.018244 kernel: Booting paravirtualized kernel on Hyper-V May 10 00:42:12.018253 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 00:42:12.018262 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 10 00:42:12.018271 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 10 00:42:12.018278 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 10 00:42:12.018286 kernel: pcpu-alloc: [0] 0 1 May 10 00:42:12.018295 kernel: Hyper-V: PV spinlocks enabled May 10 00:42:12.018304 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 10 00:42:12.018314 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 May 10 00:42:12.018323 kernel: Policy zone: Normal May 10 00:42:12.018332 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:42:12.018343 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 00:42:12.018350 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) May 10 00:42:12.018359 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 10 00:42:12.018367 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 00:42:12.018377 kernel: Memory: 8079144K/8387460K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 308056K reserved, 0K cma-reserved) May 10 00:42:12.018387 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 10 00:42:12.018397 kernel: ftrace: allocating 34584 entries in 136 pages May 10 00:42:12.018414 kernel: ftrace: allocated 136 pages with 2 groups May 10 00:42:12.018424 kernel: rcu: Hierarchical RCU implementation. May 10 00:42:12.018434 kernel: rcu: RCU event tracing is enabled. May 10 00:42:12.018445 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 10 00:42:12.018452 kernel: Rude variant of Tasks RCU enabled. May 10 00:42:12.018464 kernel: Tracing variant of Tasks RCU enabled. May 10 00:42:12.018472 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 00:42:12.018481 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 10 00:42:12.018489 kernel: Using NULL legacy PIC May 10 00:42:12.018501 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 May 10 00:42:12.018512 kernel: Console: colour dummy device 80x25 May 10 00:42:12.018520 kernel: printk: console [tty1] enabled May 10 00:42:12.018529 kernel: printk: console [ttyS0] enabled May 10 00:42:12.018538 kernel: printk: bootconsole [earlyser0] disabled May 10 00:42:12.018550 kernel: ACPI: Core revision 20210730 May 10 00:42:12.018557 kernel: Failed to register legacy timer interrupt May 10 00:42:12.018568 kernel: APIC: Switch to symmetric I/O mode setup May 10 00:42:12.018577 kernel: Hyper-V: Using IPI hypercalls May 10 00:42:12.018585 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593905) May 10 00:42:12.018594 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 10 00:42:12.018603 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 10 00:42:12.018614 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 00:42:12.018621 kernel: Spectre V2 : Mitigation: Retpolines May 10 00:42:12.018631 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 10 00:42:12.018643 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! May 10 00:42:12.018651 kernel: RETBleed: Vulnerable May 10 00:42:12.018659 kernel: Speculative Store Bypass: Vulnerable May 10 00:42:12.018669 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode May 10 00:42:12.018679 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 10 00:42:12.018686 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 10 00:42:12.018696 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 10 00:42:12.018704 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 10 00:42:12.018714 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' May 10 00:42:12.018721 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' May 10 00:42:12.018734 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' May 10 00:42:12.018743 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 10 00:42:12.018751 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 May 10 00:42:12.018759 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 May 10 00:42:12.018769 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 May 10 00:42:12.018779 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. May 10 00:42:12.018786 kernel: Freeing SMP alternatives memory: 32K May 10 00:42:12.018795 kernel: pid_max: default: 32768 minimum: 301 May 10 00:42:12.018804 kernel: LSM: Security Framework initializing May 10 00:42:12.018814 kernel: SELinux: Initializing. May 10 00:42:12.018822 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 10 00:42:12.018831 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 10 00:42:12.018843 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) May 10 00:42:12.018853 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. May 10 00:42:12.018860 kernel: signal: max sigframe size: 3632 May 10 00:42:12.018871 kernel: rcu: Hierarchical SRCU implementation. May 10 00:42:12.018880 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 10 00:42:12.018888 kernel: smp: Bringing up secondary CPUs ... May 10 00:42:12.018896 kernel: x86: Booting SMP configuration: May 10 00:42:12.018903 kernel: .... node #0, CPUs: #1 May 10 00:42:12.018913 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. May 10 00:42:12.018924 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 10 00:42:12.018942 kernel: smp: Brought up 1 node, 2 CPUs May 10 00:42:12.018949 kernel: smpboot: Max logical packages: 1 May 10 00:42:12.018956 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) May 10 00:42:12.018964 kernel: devtmpfs: initialized May 10 00:42:12.018971 kernel: x86/mm: Memory block size: 128MB May 10 00:42:12.018978 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) May 10 00:42:12.018985 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 00:42:12.018993 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 10 00:42:12.019003 kernel: pinctrl core: initialized pinctrl subsystem May 10 00:42:12.019015 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 00:42:12.019022 kernel: audit: initializing netlink subsys (disabled) May 10 00:42:12.019033 kernel: audit: type=2000 audit(1746837730.023:1): state=initialized audit_enabled=0 res=1 May 10 00:42:12.019041 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 00:42:12.019051 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 00:42:12.019058 kernel: cpuidle: using governor menu May 10 00:42:12.019069 kernel: ACPI: bus type PCI registered May 10 00:42:12.019079 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 00:42:12.019089 kernel: dca service started, version 1.12.1 May 10 00:42:12.019100 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 00:42:12.019109 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 10 00:42:12.019118 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 00:42:12.019126 kernel: ACPI: Added _OSI(Module Device) May 10 00:42:12.019136 kernel: ACPI: Added _OSI(Processor Device) May 10 00:42:12.019147 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 00:42:12.019154 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 00:42:12.019164 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 00:42:12.019175 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 00:42:12.019185 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 00:42:12.019192 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 10 00:42:12.019202 kernel: ACPI: Interpreter enabled May 10 00:42:12.019212 kernel: ACPI: PM: (supports S0 S5) May 10 00:42:12.019220 kernel: ACPI: Using IOAPIC for interrupt routing May 10 00:42:12.019228 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 00:42:12.019238 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F May 10 00:42:12.019246 kernel: iommu: Default domain type: Translated May 10 00:42:12.019258 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 00:42:12.019266 kernel: vgaarb: loaded May 10 00:42:12.019276 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 00:42:12.019286 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 00:42:12.019294 kernel: PTP clock support registered May 10 00:42:12.019303 kernel: Registered efivars operations May 10 00:42:12.019312 kernel: PCI: Using ACPI for IRQ routing May 10 00:42:12.019322 kernel: PCI: System does not support PCI May 10 00:42:12.019330 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page May 10 00:42:12.019343 kernel: VFS: Disk quotas dquot_6.6.0 May 10 00:42:12.019350 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 00:42:12.019361 kernel: pnp: PnP ACPI init May 10 00:42:12.019368 kernel: pnp: PnP ACPI: found 3 devices May 10 00:42:12.019378 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 00:42:12.019387 kernel: NET: Registered PF_INET protocol family May 10 00:42:12.019397 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 10 00:42:12.019404 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) May 10 00:42:12.019415 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 00:42:12.019427 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) May 10 00:42:12.019436 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) May 10 00:42:12.019446 kernel: TCP: Hash tables configured (established 65536 bind 65536) May 10 00:42:12.019455 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) May 10 00:42:12.019465 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) May 10 00:42:12.019472 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 00:42:12.019483 kernel: NET: Registered PF_XDP protocol family May 10 00:42:12.019491 kernel: PCI: CLS 0 bytes, default 64 May 10 00:42:12.019501 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 10 00:42:12.019511 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) May 10 00:42:12.019521 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 10 00:42:12.019532 kernel: Initialise system trusted keyrings May 10 00:42:12.019539 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 May 10 00:42:12.019548 kernel: Key type asymmetric registered May 10 00:42:12.019556 kernel: Asymmetric key parser 'x509' registered May 10 00:42:12.019567 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 00:42:12.019574 kernel: io scheduler mq-deadline registered May 10 00:42:12.019581 kernel: io scheduler kyber registered May 10 00:42:12.019594 kernel: io scheduler bfq registered May 10 00:42:12.019601 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 00:42:12.019609 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 00:42:12.019619 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 00:42:12.019626 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A May 10 00:42:12.019635 kernel: i8042: PNP: No PS/2 controller found. May 10 00:42:12.019767 kernel: rtc_cmos 00:02: registered as rtc0 May 10 00:42:12.019853 kernel: rtc_cmos 00:02: setting system clock to 2025-05-10T00:42:11 UTC (1746837731) May 10 00:42:12.019932 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram May 10 00:42:12.019942 kernel: intel_pstate: CPU model not supported May 10 00:42:12.019949 kernel: efifb: probing for efifb May 10 00:42:12.019957 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k May 10 00:42:12.019964 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 May 10 00:42:12.019971 kernel: efifb: scrolling: redraw May 10 00:42:12.019979 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 10 00:42:12.019986 kernel: Console: switching to colour frame buffer device 128x48 May 10 00:42:12.019996 kernel: fb0: EFI VGA frame buffer device May 10 00:42:12.020003 kernel: pstore: Registered efi as persistent store backend May 10 00:42:12.020015 kernel: NET: Registered PF_INET6 protocol family May 10 00:42:12.020022 kernel: Segment Routing with IPv6 May 10 00:42:12.020029 kernel: In-situ OAM (IOAM) with IPv6 May 10 00:42:12.020038 kernel: NET: Registered PF_PACKET protocol family May 10 00:42:12.020048 kernel: Key type dns_resolver registered May 10 00:42:12.020055 kernel: IPI shorthand broadcast: enabled May 10 00:42:12.020062 kernel: sched_clock: Marking stable (787369000, 19943500)->(972647900, -165335400) May 10 00:42:12.020074 kernel: registered taskstats version 1 May 10 00:42:12.020085 kernel: Loading compiled-in X.509 certificates May 10 00:42:12.020092 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 00:42:12.020102 kernel: Key type .fscrypt registered May 10 00:42:12.020110 kernel: Key type fscrypt-provisioning registered May 10 00:42:12.020118 kernel: pstore: Using crash dump compression: deflate May 10 00:42:12.020131 kernel: ima: No TPM chip found, activating TPM-bypass! May 10 00:42:12.020138 kernel: ima: Allocated hash algorithm: sha1 May 10 00:42:12.020149 kernel: ima: No architecture policies found May 10 00:42:12.020161 kernel: clk: Disabling unused clocks May 10 00:42:12.020169 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 00:42:12.020178 kernel: Write protecting the kernel read-only data: 28672k May 10 00:42:12.020187 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 00:42:12.020198 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 00:42:12.020205 kernel: Run /init as init process May 10 00:42:12.020215 kernel: with arguments: May 10 00:42:12.020224 kernel: /init May 10 00:42:12.020234 kernel: with environment: May 10 00:42:12.020243 kernel: HOME=/ May 10 00:42:12.020253 kernel: TERM=linux May 10 00:42:12.020262 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 00:42:12.020273 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:42:12.020285 systemd[1]: Detected virtualization microsoft. May 10 00:42:12.020294 systemd[1]: Detected architecture x86-64. May 10 00:42:12.020304 systemd[1]: Running in initrd. May 10 00:42:12.020312 systemd[1]: No hostname configured, using default hostname. May 10 00:42:12.020324 systemd[1]: Hostname set to . May 10 00:42:12.020336 systemd[1]: Initializing machine ID from random generator. May 10 00:42:12.020343 systemd[1]: Queued start job for default target initrd.target. May 10 00:42:12.020353 systemd[1]: Started systemd-ask-password-console.path. May 10 00:42:12.020362 systemd[1]: Reached target cryptsetup.target. May 10 00:42:12.020373 systemd[1]: Reached target paths.target. May 10 00:42:12.020380 systemd[1]: Reached target slices.target. May 10 00:42:12.020391 systemd[1]: Reached target swap.target. May 10 00:42:12.020402 systemd[1]: Reached target timers.target. May 10 00:42:12.020413 systemd[1]: Listening on iscsid.socket. May 10 00:42:12.020422 systemd[1]: Listening on iscsiuio.socket. May 10 00:42:12.020432 systemd[1]: Listening on systemd-journald-audit.socket. May 10 00:42:12.020443 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 00:42:12.020451 systemd[1]: Listening on systemd-journald.socket. May 10 00:42:12.020461 systemd[1]: Listening on systemd-networkd.socket. May 10 00:42:12.020471 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:42:12.020483 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:42:12.020492 systemd[1]: Reached target sockets.target. May 10 00:42:12.020502 systemd[1]: Starting kmod-static-nodes.service... May 10 00:42:12.020513 systemd[1]: Finished network-cleanup.service. May 10 00:42:12.020520 systemd[1]: Starting systemd-fsck-usr.service... May 10 00:42:12.020531 systemd[1]: Starting systemd-journald.service... May 10 00:42:12.020540 systemd[1]: Starting systemd-modules-load.service... May 10 00:42:12.020551 systemd[1]: Starting systemd-resolved.service... May 10 00:42:12.020560 systemd[1]: Starting systemd-vconsole-setup.service... May 10 00:42:12.020572 systemd[1]: Finished kmod-static-nodes.service. May 10 00:42:12.020586 systemd-journald[183]: Journal started May 10 00:42:12.020633 systemd-journald[183]: Runtime Journal (/run/log/journal/842430bebe3f4723859d0dace71967f1) is 8.0M, max 159.0M, 151.0M free. May 10 00:42:12.022513 systemd-modules-load[184]: Inserted module 'overlay' May 10 00:42:12.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.040940 kernel: audit: type=1130 audit(1746837732.029:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.040963 systemd[1]: Started systemd-journald.service. May 10 00:42:12.058311 systemd-resolved[185]: Positive Trust Anchors: May 10 00:42:12.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.062589 systemd[1]: Finished systemd-fsck-usr.service. May 10 00:42:12.079086 kernel: audit: type=1130 audit(1746837732.061:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.075696 systemd[1]: Finished systemd-vconsole-setup.service. May 10 00:42:12.079945 systemd[1]: Starting dracut-cmdline-ask.service... May 10 00:42:12.083095 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:42:12.121792 kernel: audit: type=1130 audit(1746837732.074:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.121822 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 00:42:12.121840 kernel: audit: type=1130 audit(1746837732.078:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.083185 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:42:12.086884 systemd-resolved[185]: Defaulting to hostname 'linux'. May 10 00:42:12.126772 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:42:12.149686 kernel: Bridge firewalling registered May 10 00:42:12.141318 systemd-modules-load[184]: Inserted module 'br_netfilter' May 10 00:42:12.142486 systemd[1]: Started systemd-resolved.service. May 10 00:42:12.144764 systemd[1]: Finished dracut-cmdline-ask.service. May 10 00:42:12.146988 systemd[1]: Reached target nss-lookup.target. May 10 00:42:12.158447 systemd[1]: Starting dracut-cmdline.service... May 10 00:42:12.162527 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:42:12.167575 dracut-cmdline[200]: dracut-dracut-053 May 10 00:42:12.169989 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:42:12.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.206890 kernel: audit: type=1130 audit(1746837732.143:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.206939 kernel: audit: type=1130 audit(1746837732.145:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.219399 kernel: audit: type=1130 audit(1746837732.182:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.219431 kernel: SCSI subsystem initialized May 10 00:42:12.249527 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 00:42:12.249588 kernel: device-mapper: uevent: version 1.0.3 May 10 00:42:12.255951 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 00:42:12.261991 systemd-modules-load[184]: Inserted module 'dm_multipath' May 10 00:42:12.264611 systemd[1]: Finished systemd-modules-load.service. May 10 00:42:12.269569 systemd[1]: Starting systemd-sysctl.service... May 10 00:42:12.283373 kernel: audit: type=1130 audit(1746837732.267:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.283404 kernel: Loading iSCSI transport class v2.0-870. May 10 00:42:12.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.296074 systemd[1]: Finished systemd-sysctl.service. May 10 00:42:12.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.313987 kernel: audit: type=1130 audit(1746837732.297:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.324949 kernel: iscsi: registered transport (tcp) May 10 00:42:12.351623 kernel: iscsi: registered transport (qla4xxx) May 10 00:42:12.351674 kernel: QLogic iSCSI HBA Driver May 10 00:42:12.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.380361 systemd[1]: Finished dracut-cmdline.service. May 10 00:42:12.385407 systemd[1]: Starting dracut-pre-udev.service... May 10 00:42:12.434950 kernel: raid6: avx512x4 gen() 18057 MB/s May 10 00:42:12.453939 kernel: raid6: avx512x4 xor() 7839 MB/s May 10 00:42:12.473935 kernel: raid6: avx512x2 gen() 18361 MB/s May 10 00:42:12.494951 kernel: raid6: avx512x2 xor() 29217 MB/s May 10 00:42:12.514937 kernel: raid6: avx512x1 gen() 18314 MB/s May 10 00:42:12.534940 kernel: raid6: avx512x1 xor() 26247 MB/s May 10 00:42:12.554941 kernel: raid6: avx2x4 gen() 18294 MB/s May 10 00:42:12.574940 kernel: raid6: avx2x4 xor() 7779 MB/s May 10 00:42:12.593937 kernel: raid6: avx2x2 gen() 18212 MB/s May 10 00:42:12.613939 kernel: raid6: avx2x2 xor() 21794 MB/s May 10 00:42:12.632946 kernel: raid6: avx2x1 gen() 13735 MB/s May 10 00:42:12.652937 kernel: raid6: avx2x1 xor() 18702 MB/s May 10 00:42:12.672938 kernel: raid6: sse2x4 gen() 11570 MB/s May 10 00:42:12.692934 kernel: raid6: sse2x4 xor() 7259 MB/s May 10 00:42:12.712935 kernel: raid6: sse2x2 gen() 12714 MB/s May 10 00:42:12.734942 kernel: raid6: sse2x2 xor() 7628 MB/s May 10 00:42:12.754940 kernel: raid6: sse2x1 gen() 11181 MB/s May 10 00:42:12.777251 kernel: raid6: sse2x1 xor() 5791 MB/s May 10 00:42:12.777292 kernel: raid6: using algorithm avx512x2 gen() 18361 MB/s May 10 00:42:12.777313 kernel: raid6: .... xor() 29217 MB/s, rmw enabled May 10 00:42:12.784104 kernel: raid6: using avx512x2 recovery algorithm May 10 00:42:12.799950 kernel: xor: automatically using best checksumming function avx May 10 00:42:12.893957 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 00:42:12.902279 systemd[1]: Finished dracut-pre-udev.service. May 10 00:42:12.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.905000 audit: BPF prog-id=7 op=LOAD May 10 00:42:12.905000 audit: BPF prog-id=8 op=LOAD May 10 00:42:12.906660 systemd[1]: Starting systemd-udevd.service... May 10 00:42:12.921302 systemd-udevd[384]: Using default interface naming scheme 'v252'. May 10 00:42:12.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.927799 systemd[1]: Started systemd-udevd.service. May 10 00:42:12.930788 systemd[1]: Starting dracut-pre-trigger.service... May 10 00:42:12.950735 dracut-pre-trigger[396]: rd.md=0: removing MD RAID activation May 10 00:42:12.979285 systemd[1]: Finished dracut-pre-trigger.service. May 10 00:42:12.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:12.986306 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:42:13.019724 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:42:13.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:13.069943 kernel: cryptd: max_cpu_qlen set to 1000 May 10 00:42:13.076945 kernel: hv_vmbus: Vmbus version:5.2 May 10 00:42:13.108951 kernel: hv_vmbus: registering driver hyperv_keyboard May 10 00:42:13.114942 kernel: hv_vmbus: registering driver hv_netvsc May 10 00:42:13.124943 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 May 10 00:42:13.139331 kernel: AVX2 version of gcm_enc/dec engaged. May 10 00:42:13.139372 kernel: AES CTR mode by8 optimization enabled May 10 00:42:13.154037 kernel: hv_vmbus: registering driver hv_storvsc May 10 00:42:13.154083 kernel: hid: raw HID events driver (C) Jiri Kosina May 10 00:42:13.155941 kernel: scsi host0: storvsc_host_t May 10 00:42:13.156153 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 May 10 00:42:13.156949 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 May 10 00:42:13.174939 kernel: scsi host1: storvsc_host_t May 10 00:42:13.185945 kernel: hv_vmbus: registering driver hid_hyperv May 10 00:42:13.197117 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 May 10 00:42:13.197158 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on May 10 00:42:13.213008 kernel: sr 0:0:0:2: [sr0] scsi-1 drive May 10 00:42:13.215527 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 10 00:42:13.215548 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 May 10 00:42:13.227810 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) May 10 00:42:13.250629 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks May 10 00:42:13.250818 kernel: sd 0:0:0:0: [sda] Write Protect is off May 10 00:42:13.251017 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 May 10 00:42:13.251169 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA May 10 00:42:13.251317 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:42:13.251336 kernel: sd 0:0:0:0: [sda] Attached SCSI disk May 10 00:42:13.299391 kernel: hv_netvsc 7c1e5235-cfec-7c1e-5235-cfec7c1e5235 eth0: VF slot 1 added May 10 00:42:13.308942 kernel: hv_vmbus: registering driver hv_pci May 10 00:42:13.308993 kernel: hv_pci dba4be9f-c6b9-41d9-b0c3-ff24c6d364e7: PCI VMBus probing: Using version 0x10004 May 10 00:42:13.387246 kernel: hv_pci dba4be9f-c6b9-41d9-b0c3-ff24c6d364e7: PCI host bridge to bus c6b9:00 May 10 00:42:13.387426 kernel: pci_bus c6b9:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] May 10 00:42:13.387600 kernel: pci_bus c6b9:00: No busn resource found for root bus, will use [bus 00-ff] May 10 00:42:13.387745 kernel: pci c6b9:00:02.0: [15b3:1016] type 00 class 0x020000 May 10 00:42:13.387916 kernel: pci c6b9:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] May 10 00:42:13.388118 kernel: pci c6b9:00:02.0: enabling Extended Tags May 10 00:42:13.388270 kernel: pci c6b9:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at c6b9:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) May 10 00:42:13.388420 kernel: pci_bus c6b9:00: busn_res: [bus 00-ff] end is updated to 00 May 10 00:42:13.388563 kernel: pci c6b9:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] May 10 00:42:13.478951 kernel: mlx5_core c6b9:00:02.0: firmware version: 14.30.5000 May 10 00:42:13.740555 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (438) May 10 00:42:13.740580 kernel: mlx5_core c6b9:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) May 10 00:42:13.740755 kernel: mlx5_core c6b9:00:02.0: Supported tc offload range - chains: 1, prios: 1 May 10 00:42:13.740912 kernel: mlx5_core c6b9:00:02.0: mlx5e_tc_post_act_init:40:(pid 16): firmware level support is missing May 10 00:42:13.741086 kernel: hv_netvsc 7c1e5235-cfec-7c1e-5235-cfec7c1e5235 eth0: VF registering: eth1 May 10 00:42:13.741242 kernel: mlx5_core c6b9:00:02.0 eth1: joined to eth0 May 10 00:42:13.647573 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 00:42:13.655424 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:42:13.750009 kernel: mlx5_core c6b9:00:02.0 enP50873s1: renamed from eth1 May 10 00:42:13.783448 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 00:42:13.791763 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 00:42:13.794310 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 00:42:13.795967 systemd[1]: Starting disk-uuid.service... May 10 00:42:13.813953 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:42:13.821956 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:42:14.830717 disk-uuid[564]: The operation has completed successfully. May 10 00:42:14.833307 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:42:14.896664 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 00:42:14.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:14.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:14.896766 systemd[1]: Finished disk-uuid.service. May 10 00:42:14.911887 systemd[1]: Starting verity-setup.service... May 10 00:42:14.944952 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 10 00:42:15.201294 systemd[1]: Found device dev-mapper-usr.device. May 10 00:42:15.203411 systemd[1]: Mounting sysusr-usr.mount... May 10 00:42:15.210695 systemd[1]: Finished verity-setup.service. May 10 00:42:15.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:15.291949 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 00:42:15.292659 systemd[1]: Mounted sysusr-usr.mount. May 10 00:42:15.297507 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 10 00:42:15.302683 systemd[1]: Starting ignition-setup.service... May 10 00:42:15.308831 systemd[1]: Starting parse-ip-for-networkd.service... May 10 00:42:15.344013 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:42:15.344088 kernel: BTRFS info (device sda6): using free space tree May 10 00:42:15.344114 kernel: BTRFS info (device sda6): has skinny extents May 10 00:42:15.396733 systemd[1]: Finished parse-ip-for-networkd.service. May 10 00:42:15.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:15.402000 audit: BPF prog-id=9 op=LOAD May 10 00:42:15.403791 systemd[1]: Starting systemd-networkd.service... May 10 00:42:15.421302 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 00:42:15.437099 systemd-networkd[805]: lo: Link UP May 10 00:42:15.437107 systemd-networkd[805]: lo: Gained carrier May 10 00:42:15.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:15.441548 systemd-networkd[805]: Enumeration completed May 10 00:42:15.441622 systemd[1]: Started systemd-networkd.service. May 10 00:42:15.445140 systemd-networkd[805]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:42:15.447809 systemd[1]: Reached target network.target. May 10 00:42:15.451843 systemd[1]: Starting iscsiuio.service... May 10 00:42:15.467300 systemd[1]: Started iscsiuio.service. May 10 00:42:15.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:15.469600 systemd[1]: Starting iscsid.service... May 10 00:42:15.474858 iscsid[814]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 00:42:15.474858 iscsid[814]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 10 00:42:15.474858 iscsid[814]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 00:42:15.474858 iscsid[814]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 00:42:15.474858 iscsid[814]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 00:42:15.474858 iscsid[814]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 00:42:15.474858 iscsid[814]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 00:42:15.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:15.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:15.478172 systemd[1]: Started iscsid.service. May 10 00:42:15.481076 systemd[1]: Starting dracut-initqueue.service... May 10 00:42:15.498194 systemd[1]: Finished dracut-initqueue.service. May 10 00:42:15.501349 systemd[1]: Reached target remote-fs-pre.target. May 10 00:42:15.533129 kernel: mlx5_core c6b9:00:02.0 enP50873s1: Link up May 10 00:42:15.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:15.505748 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:42:15.510850 systemd[1]: Reached target remote-fs.target. May 10 00:42:15.517223 systemd[1]: Starting dracut-pre-mount.service... May 10 00:42:15.530790 systemd[1]: Finished dracut-pre-mount.service. May 10 00:42:15.562957 kernel: hv_netvsc 7c1e5235-cfec-7c1e-5235-cfec7c1e5235 eth0: Data path switched to VF: enP50873s1 May 10 00:42:15.567948 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:42:15.568007 systemd-networkd[805]: enP50873s1: Link UP May 10 00:42:15.568164 systemd-networkd[805]: eth0: Link UP May 10 00:42:15.568317 systemd-networkd[805]: eth0: Gained carrier May 10 00:42:15.574088 systemd-networkd[805]: enP50873s1: Gained carrier May 10 00:42:15.592027 systemd-networkd[805]: eth0: DHCPv4 address 10.200.8.40/24, gateway 10.200.8.1 acquired from 168.63.129.16 May 10 00:42:15.593768 systemd[1]: Finished ignition-setup.service. May 10 00:42:15.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:15.601844 systemd[1]: Starting ignition-fetch-offline.service... May 10 00:42:16.677120 systemd-networkd[805]: eth0: Gained IPv6LL May 10 00:42:18.137563 ignition[829]: Ignition 2.14.0 May 10 00:42:18.137582 ignition[829]: Stage: fetch-offline May 10 00:42:18.137673 ignition[829]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:42:18.137726 ignition[829]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 10 00:42:18.215415 ignition[829]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 10 00:42:18.218454 ignition[829]: parsed url from cmdline: "" May 10 00:42:18.218465 ignition[829]: no config URL provided May 10 00:42:18.218474 ignition[829]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:42:18.218491 ignition[829]: no config at "/usr/lib/ignition/user.ign" May 10 00:42:18.218499 ignition[829]: failed to fetch config: resource requires networking May 10 00:42:18.248418 kernel: kauditd_printk_skb: 18 callbacks suppressed May 10 00:42:18.248450 kernel: audit: type=1130 audit(1746837738.228:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:18.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:18.224301 systemd[1]: Finished ignition-fetch-offline.service. May 10 00:42:18.223397 ignition[829]: Ignition finished successfully May 10 00:42:18.229964 systemd[1]: Starting ignition-fetch.service... May 10 00:42:18.238615 ignition[835]: Ignition 2.14.0 May 10 00:42:18.238621 ignition[835]: Stage: fetch May 10 00:42:18.238726 ignition[835]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:42:18.238751 ignition[835]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 10 00:42:18.242055 ignition[835]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 10 00:42:18.244047 ignition[835]: parsed url from cmdline: "" May 10 00:42:18.244053 ignition[835]: no config URL provided May 10 00:42:18.244065 ignition[835]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:42:18.244633 ignition[835]: no config at "/usr/lib/ignition/user.ign" May 10 00:42:18.244676 ignition[835]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 May 10 00:42:18.342452 ignition[835]: GET result: OK May 10 00:42:18.342667 ignition[835]: config has been read from IMDS userdata May 10 00:42:18.342717 ignition[835]: parsing config with SHA512: c7384e06f40667175d560cee5e94ef8ca36fe294b76ef6b773aaa60ed896b0855ec2992fbef687150f95c812b4e15c30b5716f3d0a8ba699b5df91194505d6a5 May 10 00:42:18.349921 unknown[835]: fetched base config from "system" May 10 00:42:18.349950 unknown[835]: fetched base config from "system" May 10 00:42:18.349958 unknown[835]: fetched user config from "azure" May 10 00:42:18.355402 ignition[835]: fetch: fetch complete May 10 00:42:18.355412 ignition[835]: fetch: fetch passed May 10 00:42:18.355465 ignition[835]: Ignition finished successfully May 10 00:42:18.360866 systemd[1]: Finished ignition-fetch.service. May 10 00:42:18.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:18.374214 systemd[1]: Starting ignition-kargs.service... May 10 00:42:18.379124 kernel: audit: type=1130 audit(1746837738.362:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:18.385351 ignition[841]: Ignition 2.14.0 May 10 00:42:18.385360 ignition[841]: Stage: kargs May 10 00:42:18.385500 ignition[841]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:42:18.385532 ignition[841]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 10 00:42:18.390260 ignition[841]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 10 00:42:18.392239 ignition[841]: kargs: kargs passed May 10 00:42:18.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:18.394157 systemd[1]: Finished ignition-kargs.service. May 10 00:42:18.412640 kernel: audit: type=1130 audit(1746837738.397:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:18.392283 ignition[841]: Ignition finished successfully May 10 00:42:18.398914 systemd[1]: Starting ignition-disks.service... May 10 00:42:18.412568 ignition[847]: Ignition 2.14.0 May 10 00:42:18.412575 ignition[847]: Stage: disks May 10 00:42:18.412702 ignition[847]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:42:18.412735 ignition[847]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 10 00:42:18.421855 ignition[847]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 10 00:42:18.423860 ignition[847]: disks: disks passed May 10 00:42:18.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:18.424579 systemd[1]: Finished ignition-disks.service. May 10 00:42:18.443064 kernel: audit: type=1130 audit(1746837738.426:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:18.423903 ignition[847]: Ignition finished successfully May 10 00:42:18.426437 systemd[1]: Reached target initrd-root-device.target. May 10 00:42:18.439648 systemd[1]: Reached target local-fs-pre.target. May 10 00:42:18.443042 systemd[1]: Reached target local-fs.target. May 10 00:42:18.444672 systemd[1]: Reached target sysinit.target. May 10 00:42:18.446430 systemd[1]: Reached target basic.target. May 10 00:42:18.448814 systemd[1]: Starting systemd-fsck-root.service... May 10 00:42:18.500169 systemd-fsck[855]: ROOT: clean, 623/7326000 files, 481079/7359488 blocks May 10 00:42:18.504682 systemd[1]: Finished systemd-fsck-root.service. May 10 00:42:18.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:18.509508 systemd[1]: Mounting sysroot.mount... May 10 00:42:18.524393 kernel: audit: type=1130 audit(1746837738.508:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:18.536803 systemd[1]: Mounted sysroot.mount. May 10 00:42:18.539791 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 00:42:18.539863 systemd[1]: Reached target initrd-root-fs.target. May 10 00:42:18.572572 systemd[1]: Mounting sysroot-usr.mount... May 10 00:42:18.578239 systemd[1]: Starting flatcar-metadata-hostname.service... May 10 00:42:18.583052 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 00:42:18.583092 systemd[1]: Reached target ignition-diskful.target. May 10 00:42:18.592538 systemd[1]: Mounted sysroot-usr.mount. May 10 00:42:18.636940 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:42:18.642345 systemd[1]: Starting initrd-setup-root.service... May 10 00:42:18.658956 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (865) May 10 00:42:18.664566 initrd-setup-root[870]: cut: /sysroot/etc/passwd: No such file or directory May 10 00:42:18.674577 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:42:18.674598 kernel: BTRFS info (device sda6): using free space tree May 10 00:42:18.674620 kernel: BTRFS info (device sda6): has skinny extents May 10 00:42:18.678349 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:42:18.691559 initrd-setup-root[896]: cut: /sysroot/etc/group: No such file or directory May 10 00:42:18.712033 initrd-setup-root[904]: cut: /sysroot/etc/shadow: No such file or directory May 10 00:42:18.719312 initrd-setup-root[912]: cut: /sysroot/etc/gshadow: No such file or directory May 10 00:42:19.264899 systemd[1]: Finished initrd-setup-root.service. May 10 00:42:19.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:19.267829 systemd[1]: Starting ignition-mount.service... May 10 00:42:19.289568 kernel: audit: type=1130 audit(1746837739.266:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:19.287294 systemd[1]: Starting sysroot-boot.service... May 10 00:42:19.293286 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 10 00:42:19.293411 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 10 00:42:19.313414 ignition[931]: INFO : Ignition 2.14.0 May 10 00:42:19.315600 ignition[931]: INFO : Stage: mount May 10 00:42:19.317341 ignition[931]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:42:19.317341 ignition[931]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 10 00:42:19.325231 ignition[931]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 10 00:42:19.325231 ignition[931]: INFO : mount: mount passed May 10 00:42:19.325231 ignition[931]: INFO : Ignition finished successfully May 10 00:42:19.347262 kernel: audit: type=1130 audit(1746837739.331:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:19.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:19.328602 systemd[1]: Finished ignition-mount.service. May 10 00:42:19.351376 systemd[1]: Finished sysroot-boot.service. May 10 00:42:19.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:19.365939 kernel: audit: type=1130 audit(1746837739.354:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:19.930424 coreos-metadata[864]: May 10 00:42:19.930 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 May 10 00:42:19.944189 coreos-metadata[864]: May 10 00:42:19.944 INFO Fetch successful May 10 00:42:19.977445 coreos-metadata[864]: May 10 00:42:19.977 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 May 10 00:42:19.996637 coreos-metadata[864]: May 10 00:42:19.996 INFO Fetch successful May 10 00:42:20.026046 coreos-metadata[864]: May 10 00:42:20.025 INFO wrote hostname ci-3510.3.7-n-d5b055839e to /sysroot/etc/hostname May 10 00:42:20.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:20.028144 systemd[1]: Finished flatcar-metadata-hostname.service. May 10 00:42:20.046724 kernel: audit: type=1130 audit(1746837740.030:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:20.033036 systemd[1]: Starting ignition-files.service... May 10 00:42:20.049771 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:42:20.062943 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (943) May 10 00:42:20.072225 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:42:20.072268 kernel: BTRFS info (device sda6): using free space tree May 10 00:42:20.072291 kernel: BTRFS info (device sda6): has skinny extents May 10 00:42:20.081560 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:42:20.094861 ignition[962]: INFO : Ignition 2.14.0 May 10 00:42:20.094861 ignition[962]: INFO : Stage: files May 10 00:42:20.098103 ignition[962]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:42:20.098103 ignition[962]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 10 00:42:20.114062 ignition[962]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 10 00:42:20.125348 ignition[962]: DEBUG : files: compiled without relabeling support, skipping May 10 00:42:20.128213 ignition[962]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 00:42:20.128213 ignition[962]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 00:42:20.184592 ignition[962]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 00:42:20.188181 ignition[962]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 00:42:20.191469 unknown[962]: wrote ssh authorized keys file for user: core May 10 00:42:20.193834 ignition[962]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 00:42:20.209501 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 00:42:20.215917 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 10 00:42:20.483245 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 10 00:42:20.650514 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 00:42:20.657509 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 10 00:42:20.657509 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 10 00:42:20.657509 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 10 00:42:20.657509 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 10 00:42:20.657509 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:42:20.657509 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:42:20.657509 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:42:20.657509 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:42:20.657509 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:42:20.657509 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:42:20.657509 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:42:20.657509 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:42:20.657509 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" May 10 00:42:20.657509 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition May 10 00:42:20.717190 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1051818815" May 10 00:42:20.717190 ignition[962]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1051818815": device or resource busy May 10 00:42:20.717190 ignition[962]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1051818815", trying btrfs: device or resource busy May 10 00:42:20.717190 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1051818815" May 10 00:42:20.717190 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1051818815" May 10 00:42:20.717190 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem1051818815" May 10 00:42:20.717190 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem1051818815" May 10 00:42:20.717190 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" May 10 00:42:20.717190 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 10 00:42:20.717190 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition May 10 00:42:20.717190 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4069756731" May 10 00:42:20.717190 ignition[962]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4069756731": device or resource busy May 10 00:42:20.717190 ignition[962]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4069756731", trying btrfs: device or resource busy May 10 00:42:20.717190 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4069756731" May 10 00:42:20.668598 systemd[1]: mnt-oem1051818815.mount: Deactivated successfully. May 10 00:42:20.781889 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4069756731" May 10 00:42:20.781889 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem4069756731" May 10 00:42:20.781889 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem4069756731" May 10 00:42:20.781889 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 10 00:42:20.781889 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:42:20.781889 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 May 10 00:42:20.692726 systemd[1]: mnt-oem4069756731.mount: Deactivated successfully. May 10 00:42:21.259778 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK May 10 00:42:21.660524 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:42:21.660524 ignition[962]: INFO : files: op(13): [started] processing unit "waagent.service" May 10 00:42:21.660524 ignition[962]: INFO : files: op(13): [finished] processing unit "waagent.service" May 10 00:42:21.660524 ignition[962]: INFO : files: op(14): [started] processing unit "nvidia.service" May 10 00:42:21.660524 ignition[962]: INFO : files: op(14): [finished] processing unit "nvidia.service" May 10 00:42:21.660524 ignition[962]: INFO : files: op(15): [started] processing unit "prepare-helm.service" May 10 00:42:21.679783 ignition[962]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:42:21.679783 ignition[962]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:42:21.679783 ignition[962]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" May 10 00:42:21.679783 ignition[962]: INFO : files: op(17): [started] setting preset to enabled for "waagent.service" May 10 00:42:21.679783 ignition[962]: INFO : files: op(17): [finished] setting preset to enabled for "waagent.service" May 10 00:42:21.679783 ignition[962]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" May 10 00:42:21.679783 ignition[962]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" May 10 00:42:21.679783 ignition[962]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" May 10 00:42:21.679783 ignition[962]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" May 10 00:42:21.709428 ignition[962]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 00:42:21.709428 ignition[962]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 00:42:21.709428 ignition[962]: INFO : files: files passed May 10 00:42:21.732144 kernel: audit: type=1130 audit(1746837741.715:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.732233 ignition[962]: INFO : Ignition finished successfully May 10 00:42:21.710454 systemd[1]: Finished ignition-files.service. May 10 00:42:21.737957 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 00:42:21.740274 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 00:42:21.745407 systemd[1]: Starting ignition-quench.service... May 10 00:42:21.749508 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 00:42:21.749613 systemd[1]: Finished ignition-quench.service. May 10 00:42:21.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.762799 initrd-setup-root-after-ignition[987]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 00:42:21.766770 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 00:42:21.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.771223 systemd[1]: Reached target ignition-complete.target. May 10 00:42:21.776274 systemd[1]: Starting initrd-parse-etc.service... May 10 00:42:21.790725 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 00:42:21.790835 systemd[1]: Finished initrd-parse-etc.service. May 10 00:42:21.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.796949 systemd[1]: Reached target initrd-fs.target. May 10 00:42:21.798800 systemd[1]: Reached target initrd.target. May 10 00:42:21.802334 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 00:42:21.803275 systemd[1]: Starting dracut-pre-pivot.service... May 10 00:42:21.816252 systemd[1]: Finished dracut-pre-pivot.service. May 10 00:42:21.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.820771 systemd[1]: Starting initrd-cleanup.service... May 10 00:42:21.830177 systemd[1]: Stopped target nss-lookup.target. May 10 00:42:21.832200 systemd[1]: Stopped target remote-cryptsetup.target. May 10 00:42:21.838103 systemd[1]: Stopped target timers.target. May 10 00:42:21.841537 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 00:42:21.841717 systemd[1]: Stopped dracut-pre-pivot.service. May 10 00:42:21.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.847446 systemd[1]: Stopped target initrd.target. May 10 00:42:21.850669 systemd[1]: Stopped target basic.target. May 10 00:42:21.854425 systemd[1]: Stopped target ignition-complete.target. May 10 00:42:21.857976 systemd[1]: Stopped target ignition-diskful.target. May 10 00:42:21.861821 systemd[1]: Stopped target initrd-root-device.target. May 10 00:42:21.865852 systemd[1]: Stopped target remote-fs.target. May 10 00:42:21.869826 systemd[1]: Stopped target remote-fs-pre.target. May 10 00:42:21.873826 systemd[1]: Stopped target sysinit.target. May 10 00:42:21.879242 systemd[1]: Stopped target local-fs.target. May 10 00:42:21.882486 systemd[1]: Stopped target local-fs-pre.target. May 10 00:42:21.886463 systemd[1]: Stopped target swap.target. May 10 00:42:21.889979 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 00:42:21.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.890135 systemd[1]: Stopped dracut-pre-mount.service. May 10 00:42:21.893740 systemd[1]: Stopped target cryptsetup.target. May 10 00:42:21.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.897701 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 00:42:21.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.897865 systemd[1]: Stopped dracut-initqueue.service. May 10 00:42:21.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.901854 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 00:42:21.902010 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 00:42:21.907008 systemd[1]: ignition-files.service: Deactivated successfully. May 10 00:42:21.907142 systemd[1]: Stopped ignition-files.service. May 10 00:42:21.911314 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. May 10 00:42:21.911430 systemd[1]: Stopped flatcar-metadata-hostname.service. May 10 00:42:21.916566 systemd[1]: Stopping ignition-mount.service... May 10 00:42:21.936061 ignition[1000]: INFO : Ignition 2.14.0 May 10 00:42:21.936061 ignition[1000]: INFO : Stage: umount May 10 00:42:21.936061 ignition[1000]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:42:21.936061 ignition[1000]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 10 00:42:21.936061 ignition[1000]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 10 00:42:21.936061 ignition[1000]: INFO : umount: umount passed May 10 00:42:21.936061 ignition[1000]: INFO : Ignition finished successfully May 10 00:42:21.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.978468 iscsid[814]: iscsid shutting down. May 10 00:42:21.936331 systemd[1]: Stopping iscsid.service... May 10 00:42:21.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.940770 systemd[1]: Stopping sysroot-boot.service... May 10 00:42:21.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.942657 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 00:42:21.942843 systemd[1]: Stopped systemd-udev-trigger.service. May 10 00:42:21.945261 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 00:42:21.945409 systemd[1]: Stopped dracut-pre-trigger.service. May 10 00:42:22.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.949690 systemd[1]: iscsid.service: Deactivated successfully. May 10 00:42:21.949821 systemd[1]: Stopped iscsid.service. May 10 00:42:21.967776 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 00:42:21.967884 systemd[1]: Stopped ignition-mount.service. May 10 00:42:21.973569 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 00:42:22.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.973663 systemd[1]: Finished initrd-cleanup.service. May 10 00:42:21.976896 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 00:42:21.976957 systemd[1]: Stopped ignition-disks.service. May 10 00:42:21.982063 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 00:42:22.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.982118 systemd[1]: Stopped ignition-kargs.service. May 10 00:42:22.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.985379 systemd[1]: ignition-fetch.service: Deactivated successfully. May 10 00:42:21.985438 systemd[1]: Stopped ignition-fetch.service. May 10 00:42:22.049000 audit: BPF prog-id=6 op=UNLOAD May 10 00:42:21.987422 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 00:42:21.987477 systemd[1]: Stopped ignition-fetch-offline.service. May 10 00:42:21.988757 systemd[1]: Stopped target paths.target. May 10 00:42:22.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.990217 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 00:42:22.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.993000 systemd[1]: Stopped systemd-ask-password-console.path. May 10 00:42:22.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:21.997520 systemd[1]: Stopped target slices.target. May 10 00:42:21.999295 systemd[1]: Stopped target sockets.target. May 10 00:42:22.002836 systemd[1]: iscsid.socket: Deactivated successfully. May 10 00:42:22.002896 systemd[1]: Closed iscsid.socket. May 10 00:42:22.006511 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 00:42:22.006571 systemd[1]: Stopped ignition-setup.service. May 10 00:42:22.012966 systemd[1]: Stopping iscsiuio.service... May 10 00:42:22.017234 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 10 00:42:22.017748 systemd[1]: iscsiuio.service: Deactivated successfully. May 10 00:42:22.017870 systemd[1]: Stopped iscsiuio.service. May 10 00:42:22.021503 systemd[1]: Stopped target network.target. May 10 00:42:22.025312 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 00:42:22.025359 systemd[1]: Closed iscsiuio.socket. May 10 00:42:22.027153 systemd[1]: Stopping systemd-networkd.service... May 10 00:42:22.029175 systemd[1]: Stopping systemd-resolved.service... May 10 00:42:22.032978 systemd-networkd[805]: eth0: DHCPv6 lease lost May 10 00:42:22.080000 audit: BPF prog-id=9 op=UNLOAD May 10 00:42:22.035308 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:42:22.035396 systemd[1]: Stopped systemd-networkd.service. May 10 00:42:22.041466 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 00:42:22.041557 systemd[1]: Stopped systemd-resolved.service. May 10 00:42:22.047958 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 00:42:22.047997 systemd[1]: Closed systemd-networkd.socket. May 10 00:42:22.052327 systemd[1]: Stopping network-cleanup.service... May 10 00:42:22.057467 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 00:42:22.057550 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 00:42:22.062891 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 00:42:22.063442 systemd[1]: Stopped systemd-sysctl.service. May 10 00:42:22.067274 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 00:42:22.067327 systemd[1]: Stopped systemd-modules-load.service. May 10 00:42:22.074780 systemd[1]: Stopping systemd-udevd.service... May 10 00:42:22.089268 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 10 00:42:22.126169 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 00:42:22.126359 systemd[1]: Stopped systemd-udevd.service. May 10 00:42:22.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:22.136887 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 00:42:22.136969 systemd[1]: Closed systemd-udevd-control.socket. May 10 00:42:22.141516 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 00:42:22.141567 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 00:42:22.147618 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 00:42:22.149531 systemd[1]: Stopped dracut-pre-udev.service. May 10 00:42:22.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:22.155212 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 00:42:22.157449 systemd[1]: Stopped dracut-cmdline.service. May 10 00:42:22.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:22.161173 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 00:42:22.163461 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 00:42:22.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:22.168108 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 00:42:22.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:22.170289 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 10 00:42:22.187091 kernel: hv_netvsc 7c1e5235-cfec-7c1e-5235-cfec7c1e5235 eth0: Data path switched from VF: enP50873s1 May 10 00:42:22.170377 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 10 00:42:22.187133 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 00:42:22.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:22.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:22.187219 systemd[1]: Stopped kmod-static-nodes.service. May 10 00:42:22.191078 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 00:42:22.191155 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 00:42:22.202758 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 10 00:42:22.206555 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 00:42:22.206666 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 00:42:22.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:22.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:22.213882 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 00:42:22.214018 systemd[1]: Stopped network-cleanup.service. May 10 00:42:22.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:22.460104 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 00:42:22.460240 systemd[1]: Stopped sysroot-boot.service. May 10 00:42:22.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:22.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:22.464334 systemd[1]: Reached target initrd-switch-root.target. May 10 00:42:22.467681 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 00:42:22.467755 systemd[1]: Stopped initrd-setup-root.service. May 10 00:42:22.470467 systemd[1]: Starting initrd-switch-root.service... May 10 00:42:22.484396 systemd[1]: Switching root. May 10 00:42:22.511507 systemd-journald[183]: Journal stopped May 10 00:42:33.352657 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). May 10 00:42:33.352700 kernel: SELinux: Class mctp_socket not defined in policy. May 10 00:42:33.352714 kernel: SELinux: Class anon_inode not defined in policy. May 10 00:42:33.352724 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 00:42:33.352734 kernel: SELinux: policy capability network_peer_controls=1 May 10 00:42:33.352746 kernel: SELinux: policy capability open_perms=1 May 10 00:42:33.352760 kernel: SELinux: policy capability extended_socket_class=1 May 10 00:42:33.352769 kernel: SELinux: policy capability always_check_network=0 May 10 00:42:33.352780 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 00:42:33.352788 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 00:42:33.352796 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 00:42:33.352807 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 00:42:33.352816 kernel: kauditd_printk_skb: 43 callbacks suppressed May 10 00:42:33.352828 kernel: audit: type=1403 audit(1746837744.316:82): auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 00:42:33.352841 systemd[1]: Successfully loaded SELinux policy in 279.180ms. May 10 00:42:33.352858 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 22.512ms. May 10 00:42:33.352868 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:42:33.352879 systemd[1]: Detected virtualization microsoft. May 10 00:42:33.352894 systemd[1]: Detected architecture x86-64. May 10 00:42:33.352903 systemd[1]: Detected first boot. May 10 00:42:33.352916 systemd[1]: Hostname set to . May 10 00:42:33.352925 systemd[1]: Initializing machine ID from random generator. May 10 00:42:33.355194 kernel: audit: type=1400 audit(1746837744.877:83): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:42:33.355218 kernel: audit: type=1400 audit(1746837744.892:84): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:42:33.355235 kernel: audit: type=1400 audit(1746837744.892:85): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:42:33.355253 kernel: audit: type=1334 audit(1746837744.905:86): prog-id=10 op=LOAD May 10 00:42:33.355262 kernel: audit: type=1334 audit(1746837744.905:87): prog-id=10 op=UNLOAD May 10 00:42:33.355271 kernel: audit: type=1334 audit(1746837744.917:88): prog-id=11 op=LOAD May 10 00:42:33.355279 kernel: audit: type=1334 audit(1746837744.917:89): prog-id=11 op=UNLOAD May 10 00:42:33.355298 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 00:42:33.355315 kernel: audit: type=1400 audit(1746837745.973:90): avc: denied { associate } for pid=1035 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:42:33.355327 kernel: audit: type=1300 audit(1746837745.973:90): arch=c000003e syscall=188 success=yes exit=0 a0=c0001078c2 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=1018 pid=1035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:33.355341 systemd[1]: Populated /etc with preset unit settings. May 10 00:42:33.355362 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:42:33.355382 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:42:33.355402 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:42:33.355419 kernel: kauditd_printk_skb: 7 callbacks suppressed May 10 00:42:33.355427 kernel: audit: type=1334 audit(1746837752.702:92): prog-id=12 op=LOAD May 10 00:42:33.355442 kernel: audit: type=1334 audit(1746837752.702:93): prog-id=3 op=UNLOAD May 10 00:42:33.355462 kernel: audit: type=1334 audit(1746837752.715:94): prog-id=13 op=LOAD May 10 00:42:33.355486 kernel: audit: type=1334 audit(1746837752.722:95): prog-id=14 op=LOAD May 10 00:42:33.355502 kernel: audit: type=1334 audit(1746837752.731:96): prog-id=4 op=UNLOAD May 10 00:42:33.355511 kernel: audit: type=1334 audit(1746837752.731:97): prog-id=5 op=UNLOAD May 10 00:42:33.355519 kernel: audit: type=1334 audit(1746837752.739:98): prog-id=15 op=LOAD May 10 00:42:33.355528 kernel: audit: type=1334 audit(1746837752.739:99): prog-id=12 op=UNLOAD May 10 00:42:33.355537 kernel: audit: type=1334 audit(1746837752.747:100): prog-id=16 op=LOAD May 10 00:42:33.355546 kernel: audit: type=1334 audit(1746837752.768:101): prog-id=17 op=LOAD May 10 00:42:33.355565 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 10 00:42:33.355582 systemd[1]: Stopped initrd-switch-root.service. May 10 00:42:33.355593 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 10 00:42:33.355609 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 00:42:33.355629 systemd[1]: Created slice system-addon\x2drun.slice. May 10 00:42:33.355640 systemd[1]: Created slice system-getty.slice. May 10 00:42:33.355650 systemd[1]: Created slice system-modprobe.slice. May 10 00:42:33.355667 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 00:42:33.355689 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 00:42:33.355712 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 00:42:33.355726 systemd[1]: Created slice user.slice. May 10 00:42:33.355736 systemd[1]: Started systemd-ask-password-console.path. May 10 00:42:33.355747 systemd[1]: Started systemd-ask-password-wall.path. May 10 00:42:33.355765 systemd[1]: Set up automount boot.automount. May 10 00:42:33.355785 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 00:42:33.355803 systemd[1]: Stopped target initrd-switch-root.target. May 10 00:42:33.355821 systemd[1]: Stopped target initrd-fs.target. May 10 00:42:33.355839 systemd[1]: Stopped target initrd-root-fs.target. May 10 00:42:33.355857 systemd[1]: Reached target integritysetup.target. May 10 00:42:33.355868 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:42:33.355886 systemd[1]: Reached target remote-fs.target. May 10 00:42:33.355905 systemd[1]: Reached target slices.target. May 10 00:42:33.355922 systemd[1]: Reached target swap.target. May 10 00:42:33.355944 systemd[1]: Reached target torcx.target. May 10 00:42:33.355962 systemd[1]: Reached target veritysetup.target. May 10 00:42:33.355984 systemd[1]: Listening on systemd-coredump.socket. May 10 00:42:33.355996 systemd[1]: Listening on systemd-initctl.socket. May 10 00:42:33.356007 systemd[1]: Listening on systemd-networkd.socket. May 10 00:42:33.356030 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:42:33.356049 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:42:33.356066 systemd[1]: Listening on systemd-userdbd.socket. May 10 00:42:33.356077 systemd[1]: Mounting dev-hugepages.mount... May 10 00:42:33.356097 systemd[1]: Mounting dev-mqueue.mount... May 10 00:42:33.356117 systemd[1]: Mounting media.mount... May 10 00:42:33.356135 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:42:33.356148 systemd[1]: Mounting sys-kernel-debug.mount... May 10 00:42:33.356158 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 00:42:33.356169 systemd[1]: Mounting tmp.mount... May 10 00:42:33.356178 systemd[1]: Starting flatcar-tmpfiles.service... May 10 00:42:33.356190 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:42:33.356200 systemd[1]: Starting kmod-static-nodes.service... May 10 00:42:33.356211 systemd[1]: Starting modprobe@configfs.service... May 10 00:42:33.356229 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:42:33.356249 systemd[1]: Starting modprobe@drm.service... May 10 00:42:33.356261 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:42:33.356271 systemd[1]: Starting modprobe@fuse.service... May 10 00:42:33.356281 systemd[1]: Starting modprobe@loop.service... May 10 00:42:33.356291 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:42:33.356309 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 10 00:42:33.356328 systemd[1]: Stopped systemd-fsck-root.service. May 10 00:42:33.356342 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 10 00:42:33.356368 systemd[1]: Stopped systemd-fsck-usr.service. May 10 00:42:33.356384 systemd[1]: Stopped systemd-journald.service. May 10 00:42:33.356398 kernel: loop: module loaded May 10 00:42:33.356413 systemd[1]: Starting systemd-journald.service... May 10 00:42:33.356429 kernel: fuse: init (API version 7.34) May 10 00:42:33.356442 systemd[1]: Starting systemd-modules-load.service... May 10 00:42:33.356461 systemd[1]: Starting systemd-network-generator.service... May 10 00:42:33.356476 systemd[1]: Starting systemd-remount-fs.service... May 10 00:42:33.356492 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:42:33.356518 systemd-journald[1132]: Journal started May 10 00:42:33.356601 systemd-journald[1132]: Runtime Journal (/run/log/journal/c4dea4727f514597b040c8102df31d29) is 8.0M, max 159.0M, 151.0M free. May 10 00:42:24.316000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 00:42:24.877000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:42:24.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:42:24.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:42:24.905000 audit: BPF prog-id=10 op=LOAD May 10 00:42:24.905000 audit: BPF prog-id=10 op=UNLOAD May 10 00:42:24.917000 audit: BPF prog-id=11 op=LOAD May 10 00:42:24.917000 audit: BPF prog-id=11 op=UNLOAD May 10 00:42:25.973000 audit[1035]: AVC avc: denied { associate } for pid=1035 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:42:25.973000 audit[1035]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001078c2 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=1018 pid=1035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:25.973000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:42:25.983000 audit[1035]: AVC avc: denied { associate } for pid=1035 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 10 00:42:25.983000 audit[1035]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000107999 a2=1ed a3=0 items=2 ppid=1018 pid=1035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:25.983000 audit: CWD cwd="/" May 10 00:42:25.983000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:25.983000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:25.983000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:42:32.702000 audit: BPF prog-id=12 op=LOAD May 10 00:42:32.702000 audit: BPF prog-id=3 op=UNLOAD May 10 00:42:32.715000 audit: BPF prog-id=13 op=LOAD May 10 00:42:32.722000 audit: BPF prog-id=14 op=LOAD May 10 00:42:32.731000 audit: BPF prog-id=4 op=UNLOAD May 10 00:42:32.731000 audit: BPF prog-id=5 op=UNLOAD May 10 00:42:32.739000 audit: BPF prog-id=15 op=LOAD May 10 00:42:32.739000 audit: BPF prog-id=12 op=UNLOAD May 10 00:42:32.747000 audit: BPF prog-id=16 op=LOAD May 10 00:42:32.768000 audit: BPF prog-id=17 op=LOAD May 10 00:42:32.776000 audit: BPF prog-id=13 op=UNLOAD May 10 00:42:32.776000 audit: BPF prog-id=14 op=UNLOAD May 10 00:42:32.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:32.793000 audit: BPF prog-id=15 op=UNLOAD May 10 00:42:32.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:32.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.226000 audit: BPF prog-id=18 op=LOAD May 10 00:42:33.226000 audit: BPF prog-id=19 op=LOAD May 10 00:42:33.227000 audit: BPF prog-id=20 op=LOAD May 10 00:42:33.227000 audit: BPF prog-id=16 op=UNLOAD May 10 00:42:33.227000 audit: BPF prog-id=17 op=UNLOAD May 10 00:42:33.345000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 00:42:33.345000 audit[1132]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fff89d79280 a2=4000 a3=7fff89d7931c items=0 ppid=1 pid=1132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:33.345000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 00:42:32.700643 systemd[1]: Queued start job for default target multi-user.target. May 10 00:42:25.930728 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:42:32.700660 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 10 00:42:25.942765 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:25Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:42:32.778243 systemd[1]: systemd-journald.service: Deactivated successfully. May 10 00:42:25.942792 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:25Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:42:25.942850 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:25Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 10 00:42:25.942862 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:25Z" level=debug msg="skipped missing lower profile" missing profile=oem May 10 00:42:25.942921 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:25Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 10 00:42:25.942961 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:25Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 10 00:42:25.943234 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:25Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 10 00:42:25.943292 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:25Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:42:25.943306 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:25Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:42:25.957197 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:25Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 10 00:42:25.957258 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:25Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 10 00:42:25.957288 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:25Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 10 00:42:25.957309 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:25Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 10 00:42:25.957337 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:25Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 10 00:42:25.957357 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:25Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 10 00:42:31.637414 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:31Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:42:31.637696 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:31Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:42:31.637846 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:31Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:42:31.638078 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:31Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:42:31.638245 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:31Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 10 00:42:31.638400 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:42:31Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 10 00:42:33.367896 systemd[1]: verity-setup.service: Deactivated successfully. May 10 00:42:33.368042 systemd[1]: Stopped verity-setup.service. May 10 00:42:33.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.378012 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:42:33.393754 systemd[1]: Started systemd-journald.service. May 10 00:42:33.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.407604 systemd[1]: Mounted dev-hugepages.mount. May 10 00:42:33.410169 systemd[1]: Mounted dev-mqueue.mount. May 10 00:42:33.414835 systemd[1]: Mounted media.mount. May 10 00:42:33.417022 systemd[1]: Mounted sys-kernel-debug.mount. May 10 00:42:33.419443 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 00:42:33.421712 systemd[1]: Mounted tmp.mount. May 10 00:42:33.423622 systemd[1]: Finished flatcar-tmpfiles.service. May 10 00:42:33.426509 systemd[1]: Finished kmod-static-nodes.service. May 10 00:42:33.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.431551 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 00:42:33.431899 systemd[1]: Finished modprobe@configfs.service. May 10 00:42:33.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.434794 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:42:33.435003 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:42:33.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.437432 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:42:33.437583 systemd[1]: Finished modprobe@drm.service. May 10 00:42:33.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.439996 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:42:33.440149 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:42:33.443454 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 00:42:33.443720 systemd[1]: Finished modprobe@fuse.service. May 10 00:42:33.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.448371 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:42:33.448647 systemd[1]: Finished modprobe@loop.service. May 10 00:42:33.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.452035 systemd[1]: Finished systemd-modules-load.service. May 10 00:42:33.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.455964 systemd[1]: Finished systemd-network-generator.service. May 10 00:42:33.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.459572 systemd[1]: Finished systemd-remount-fs.service. May 10 00:42:33.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.463689 systemd[1]: Reached target network-pre.target. May 10 00:42:33.472822 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 00:42:33.486936 systemd[1]: Mounting sys-kernel-config.mount... May 10 00:42:33.490905 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:42:33.499274 systemd[1]: Starting systemd-hwdb-update.service... May 10 00:42:33.505760 systemd[1]: Starting systemd-journal-flush.service... May 10 00:42:33.508840 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:42:33.512145 systemd[1]: Starting systemd-random-seed.service... May 10 00:42:33.517010 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:42:33.519762 systemd[1]: Starting systemd-sysctl.service... May 10 00:42:33.535696 systemd[1]: Starting systemd-sysusers.service... May 10 00:42:33.549888 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 00:42:33.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.553137 systemd[1]: Mounted sys-kernel-config.mount. May 10 00:42:33.560614 systemd[1]: Finished systemd-random-seed.service. May 10 00:42:33.563230 systemd[1]: Reached target first-boot-complete.target. May 10 00:42:33.569018 systemd-journald[1132]: Time spent on flushing to /var/log/journal/c4dea4727f514597b040c8102df31d29 is 45.921ms for 1159 entries. May 10 00:42:33.569018 systemd-journald[1132]: System Journal (/var/log/journal/c4dea4727f514597b040c8102df31d29) is 8.0M, max 2.6G, 2.6G free. May 10 00:42:33.692636 systemd-journald[1132]: Received client request to flush runtime journal. May 10 00:42:33.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.607171 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:42:33.618561 systemd[1]: Starting systemd-udev-settle.service... May 10 00:42:33.693374 udevadm[1159]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 10 00:42:33.628133 systemd[1]: Finished systemd-sysctl.service. May 10 00:42:33.693875 systemd[1]: Finished systemd-journal-flush.service. May 10 00:42:33.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:34.072083 systemd[1]: Finished systemd-sysusers.service. May 10 00:42:34.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:34.076048 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:42:34.381591 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:42:34.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:34.580722 systemd[1]: Finished systemd-hwdb-update.service. May 10 00:42:34.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:34.583000 audit: BPF prog-id=21 op=LOAD May 10 00:42:34.583000 audit: BPF prog-id=22 op=LOAD May 10 00:42:34.583000 audit: BPF prog-id=7 op=UNLOAD May 10 00:42:34.583000 audit: BPF prog-id=8 op=UNLOAD May 10 00:42:34.585246 systemd[1]: Starting systemd-udevd.service... May 10 00:42:34.603369 systemd-udevd[1163]: Using default interface naming scheme 'v252'. May 10 00:42:34.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:34.738000 audit: BPF prog-id=23 op=LOAD May 10 00:42:34.733302 systemd[1]: Started systemd-udevd.service. May 10 00:42:34.742311 systemd[1]: Starting systemd-networkd.service... May 10 00:42:34.788844 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 10 00:42:34.834000 audit: BPF prog-id=24 op=LOAD May 10 00:42:34.836000 audit: BPF prog-id=25 op=LOAD May 10 00:42:34.836000 audit: BPF prog-id=26 op=LOAD May 10 00:42:34.837355 systemd[1]: Starting systemd-userdbd.service... May 10 00:42:34.873953 kernel: mousedev: PS/2 mouse device common for all mice May 10 00:42:34.909566 systemd[1]: Started systemd-userdbd.service. May 10 00:42:34.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:34.922968 kernel: hv_vmbus: registering driver hyperv_fb May 10 00:42:34.940033 kernel: hv_utils: Registering HyperV Utility Driver May 10 00:42:34.940168 kernel: hv_vmbus: registering driver hv_utils May 10 00:42:34.952953 kernel: hyperv_fb: Synthvid Version major 3, minor 5 May 10 00:42:34.953056 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 May 10 00:42:34.958786 kernel: Console: switching to colour dummy device 80x25 May 10 00:42:34.970327 kernel: Console: switching to colour frame buffer device 128x48 May 10 00:42:34.902000 audit[1177]: AVC avc: denied { confidentiality } for pid=1177 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:42:34.992948 kernel: hv_vmbus: registering driver hv_balloon May 10 00:42:35.004022 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 May 10 00:42:34.902000 audit[1177]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55db1b8ed030 a1=f884 a2=7fc4302acbc5 a3=5 items=12 ppid=1163 pid=1177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:34.902000 audit: CWD cwd="/" May 10 00:42:34.902000 audit: PATH item=0 name=(null) inode=235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:34.902000 audit: PATH item=1 name=(null) inode=15483 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:34.902000 audit: PATH item=2 name=(null) inode=15483 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:34.902000 audit: PATH item=3 name=(null) inode=15484 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:34.902000 audit: PATH item=4 name=(null) inode=15483 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:34.902000 audit: PATH item=5 name=(null) inode=15485 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:34.902000 audit: PATH item=6 name=(null) inode=15483 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:34.902000 audit: PATH item=7 name=(null) inode=15486 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:34.902000 audit: PATH item=8 name=(null) inode=15483 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:34.902000 audit: PATH item=9 name=(null) inode=15487 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:34.902000 audit: PATH item=10 name=(null) inode=15483 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:34.902000 audit: PATH item=11 name=(null) inode=15488 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:34.902000 audit: PROCTITLE proctitle="(udev-worker)" May 10 00:42:35.079827 kernel: hv_utils: Heartbeat IC version 3.0 May 10 00:42:35.079944 kernel: hv_utils: Shutdown IC version 3.2 May 10 00:42:35.079971 kernel: hv_utils: TimeSync IC version 4.0 May 10 00:42:35.701402 kernel: KVM: vmx: using Hyper-V Enlightened VMCS May 10 00:42:35.710962 systemd-networkd[1171]: lo: Link UP May 10 00:42:35.710982 systemd-networkd[1171]: lo: Gained carrier May 10 00:42:35.712673 systemd-networkd[1171]: Enumeration completed May 10 00:42:35.712812 systemd[1]: Started systemd-networkd.service. May 10 00:42:35.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:35.718987 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:42:35.725749 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:42:35.743643 systemd-networkd[1171]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:42:35.798281 kernel: mlx5_core c6b9:00:02.0 enP50873s1: Link up May 10 00:42:35.819293 kernel: hv_netvsc 7c1e5235-cfec-7c1e-5235-cfec7c1e5235 eth0: Data path switched to VF: enP50873s1 May 10 00:42:35.820266 systemd-networkd[1171]: enP50873s1: Link UP May 10 00:42:35.820597 systemd-networkd[1171]: eth0: Link UP May 10 00:42:35.820691 systemd-networkd[1171]: eth0: Gained carrier May 10 00:42:35.827114 systemd-networkd[1171]: enP50873s1: Gained carrier May 10 00:42:35.832639 systemd[1]: Finished systemd-udev-settle.service. May 10 00:42:35.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:35.836590 systemd[1]: Starting lvm2-activation-early.service... May 10 00:42:35.861395 systemd-networkd[1171]: eth0: DHCPv4 address 10.200.8.40/24, gateway 10.200.8.1 acquired from 168.63.129.16 May 10 00:42:36.107608 lvm[1241]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:42:36.137575 systemd[1]: Finished lvm2-activation-early.service. May 10 00:42:36.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.158298 systemd[1]: Reached target cryptsetup.target. May 10 00:42:36.163153 systemd[1]: Starting lvm2-activation.service... May 10 00:42:36.170621 lvm[1242]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:42:36.198561 systemd[1]: Finished lvm2-activation.service. May 10 00:42:36.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.201472 systemd[1]: Reached target local-fs-pre.target. May 10 00:42:36.204792 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 00:42:36.204833 systemd[1]: Reached target local-fs.target. May 10 00:42:36.207112 systemd[1]: Reached target machines.target. May 10 00:42:36.210497 systemd[1]: Starting ldconfig.service... May 10 00:42:36.212854 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:42:36.212953 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:42:36.214273 systemd[1]: Starting systemd-boot-update.service... May 10 00:42:36.217791 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 00:42:36.222036 systemd[1]: Starting systemd-machine-id-commit.service... May 10 00:42:36.225938 systemd[1]: Starting systemd-sysext.service... May 10 00:42:36.330409 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1244 (bootctl) May 10 00:42:36.332134 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 00:42:36.695170 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 00:42:36.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.760295 systemd[1]: Unmounting usr-share-oem.mount... May 10 00:42:36.804964 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 10 00:42:36.805200 systemd[1]: Unmounted usr-share-oem.mount. May 10 00:42:36.844276 kernel: loop0: detected capacity change from 0 to 210664 May 10 00:42:36.876833 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 00:42:36.877511 systemd[1]: Finished systemd-machine-id-commit.service. May 10 00:42:36.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.890270 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 10 00:42:36.910277 kernel: loop1: detected capacity change from 0 to 210664 May 10 00:42:36.918201 (sd-sysext)[1256]: Using extensions 'kubernetes'. May 10 00:42:36.918676 (sd-sysext)[1256]: Merged extensions into '/usr'. May 10 00:42:36.935542 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:42:36.937181 systemd[1]: Mounting usr-share-oem.mount... May 10 00:42:36.940041 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:42:36.942050 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:42:36.955193 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:42:36.960673 systemd[1]: Starting modprobe@loop.service... May 10 00:42:36.963696 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:42:36.963913 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:42:36.964090 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:42:36.967296 systemd[1]: Mounted usr-share-oem.mount. May 10 00:42:36.970149 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:42:36.970345 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:42:36.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.975346 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:42:36.975496 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:42:36.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.977863 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:42:36.978014 systemd[1]: Finished modprobe@loop.service. May 10 00:42:36.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.979339 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:42:36.979447 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:42:36.981410 systemd[1]: Finished systemd-sysext.service. May 10 00:42:36.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.985130 systemd[1]: Starting ensure-sysext.service... May 10 00:42:36.989610 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 00:42:36.996844 systemd-networkd[1171]: eth0: Gained IPv6LL May 10 00:42:37.007068 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 00:42:37.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.010997 systemd[1]: Reloading. May 10 00:42:37.036610 systemd-tmpfiles[1263]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 00:42:37.065210 /usr/lib/systemd/system-generators/torcx-generator[1282]: time="2025-05-10T00:42:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:42:37.065749 /usr/lib/systemd/system-generators/torcx-generator[1282]: time="2025-05-10T00:42:37Z" level=info msg="torcx already run" May 10 00:42:37.077715 systemd-tmpfiles[1263]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 00:42:37.097090 systemd-tmpfiles[1263]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 00:42:37.217586 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:42:37.217608 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:42:37.235046 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:42:37.308000 audit: BPF prog-id=27 op=LOAD May 10 00:42:37.308000 audit: BPF prog-id=28 op=LOAD May 10 00:42:37.308000 audit: BPF prog-id=21 op=UNLOAD May 10 00:42:37.308000 audit: BPF prog-id=22 op=UNLOAD May 10 00:42:37.309000 audit: BPF prog-id=29 op=LOAD May 10 00:42:37.309000 audit: BPF prog-id=24 op=UNLOAD May 10 00:42:37.309000 audit: BPF prog-id=30 op=LOAD May 10 00:42:37.309000 audit: BPF prog-id=31 op=LOAD May 10 00:42:37.309000 audit: BPF prog-id=25 op=UNLOAD May 10 00:42:37.309000 audit: BPF prog-id=26 op=UNLOAD May 10 00:42:37.310000 audit: BPF prog-id=32 op=LOAD May 10 00:42:37.310000 audit: BPF prog-id=18 op=UNLOAD May 10 00:42:37.310000 audit: BPF prog-id=33 op=LOAD May 10 00:42:37.310000 audit: BPF prog-id=34 op=LOAD May 10 00:42:37.310000 audit: BPF prog-id=19 op=UNLOAD May 10 00:42:37.310000 audit: BPF prog-id=20 op=UNLOAD May 10 00:42:37.313000 audit: BPF prog-id=35 op=LOAD May 10 00:42:37.313000 audit: BPF prog-id=23 op=UNLOAD May 10 00:42:37.331399 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:42:37.331743 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:42:37.333369 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:42:37.338088 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:42:37.346295 systemd[1]: Starting modprobe@loop.service... May 10 00:42:37.348705 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:42:37.349014 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:42:37.349321 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:42:37.351341 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:42:37.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.351554 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:42:37.357899 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:42:37.358088 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:42:37.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.362408 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:42:37.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.362636 systemd[1]: Finished modprobe@loop.service. May 10 00:42:37.371157 systemd-fsck[1251]: fsck.fat 4.2 (2021-01-31) May 10 00:42:37.371157 systemd-fsck[1251]: /dev/sda1: 790 files, 120688/258078 clusters May 10 00:42:37.373175 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:42:37.373598 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:42:37.375612 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:42:37.378774 systemd[1]: Starting modprobe@drm.service... May 10 00:42:37.383781 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:42:37.387211 systemd[1]: Starting modprobe@loop.service... May 10 00:42:37.391025 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:42:37.391099 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:42:37.391209 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:42:37.392034 systemd[1]: Finished ensure-sysext.service. May 10 00:42:37.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.395278 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:42:37.395439 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:42:37.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.397931 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 00:42:37.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.400736 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:42:37.400896 systemd[1]: Finished modprobe@drm.service. May 10 00:42:37.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.403095 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:42:37.403240 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:42:37.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.405603 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:42:37.405744 systemd[1]: Finished modprobe@loop.service. May 10 00:42:37.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.411733 systemd[1]: Mounting boot.mount... May 10 00:42:37.413854 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:42:37.413947 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:42:37.423150 systemd[1]: Mounted boot.mount. May 10 00:42:37.437711 systemd[1]: Finished systemd-boot-update.service. May 10 00:42:37.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.743957 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 00:42:37.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.747630 systemd[1]: Starting audit-rules.service... May 10 00:42:37.750952 systemd[1]: Starting clean-ca-certificates.service... May 10 00:42:37.754564 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 00:42:37.757000 audit: BPF prog-id=36 op=LOAD May 10 00:42:37.759133 systemd[1]: Starting systemd-resolved.service... May 10 00:42:37.765418 systemd[1]: Starting systemd-timesyncd.service... May 10 00:42:37.764000 audit: BPF prog-id=37 op=LOAD May 10 00:42:37.768644 systemd[1]: Starting systemd-update-utmp.service... May 10 00:42:37.778000 audit[1362]: SYSTEM_BOOT pid=1362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 00:42:37.781535 systemd[1]: Finished systemd-update-utmp.service. May 10 00:42:37.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.825700 systemd[1]: Finished clean-ca-certificates.service. May 10 00:42:37.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.831547 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:42:37.866132 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 00:42:37.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.874781 systemd[1]: Started systemd-timesyncd.service. May 10 00:42:37.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:37.877575 systemd[1]: Reached target time-set.target. May 10 00:42:37.942170 systemd-resolved[1360]: Positive Trust Anchors: May 10 00:42:37.942199 systemd-resolved[1360]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:42:37.942240 systemd-resolved[1360]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:42:38.029545 systemd-timesyncd[1361]: Contacted time server 85.91.1.164:123 (0.flatcar.pool.ntp.org). May 10 00:42:38.029705 systemd-timesyncd[1361]: Initial clock synchronization to Sat 2025-05-10 00:42:38.029208 UTC. May 10 00:42:38.046710 systemd-resolved[1360]: Using system hostname 'ci-3510.3.7-n-d5b055839e'. May 10 00:42:38.053215 systemd[1]: Started systemd-resolved.service. May 10 00:42:38.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:38.056231 systemd[1]: Reached target network.target. May 10 00:42:38.059905 systemd[1]: Reached target network-online.target. May 10 00:42:38.062850 systemd[1]: Reached target nss-lookup.target. May 10 00:42:38.080991 augenrules[1378]: No rules May 10 00:42:38.070000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 00:42:38.070000 audit[1378]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcd73d3240 a2=420 a3=0 items=0 ppid=1357 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:38.070000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 00:42:38.083733 systemd[1]: Finished audit-rules.service. May 10 00:42:41.981110 ldconfig[1243]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 00:42:41.997171 systemd[1]: Finished ldconfig.service. May 10 00:42:42.001630 systemd[1]: Starting systemd-update-done.service... May 10 00:42:42.010831 systemd[1]: Finished systemd-update-done.service. May 10 00:42:42.014542 systemd[1]: Reached target sysinit.target. May 10 00:42:42.017465 systemd[1]: Started motdgen.path. May 10 00:42:42.020028 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 00:42:42.023877 systemd[1]: Started logrotate.timer. May 10 00:42:42.026322 systemd[1]: Started mdadm.timer. May 10 00:42:42.028736 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 00:42:42.031401 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 00:42:42.031455 systemd[1]: Reached target paths.target. May 10 00:42:42.033137 systemd[1]: Reached target timers.target. May 10 00:42:42.036317 systemd[1]: Listening on dbus.socket. May 10 00:42:42.039509 systemd[1]: Starting docker.socket... May 10 00:42:42.093983 systemd[1]: Listening on sshd.socket. May 10 00:42:42.096361 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:42:42.096936 systemd[1]: Listening on docker.socket. May 10 00:42:42.098988 systemd[1]: Reached target sockets.target. May 10 00:42:42.101473 systemd[1]: Reached target basic.target. May 10 00:42:42.104128 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:42:42.104171 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:42:42.105503 systemd[1]: Starting containerd.service... May 10 00:42:42.111290 systemd[1]: Starting dbus.service... May 10 00:42:42.114954 systemd[1]: Starting enable-oem-cloudinit.service... May 10 00:42:42.119356 systemd[1]: Starting extend-filesystems.service... May 10 00:42:42.123055 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 00:42:42.125394 systemd[1]: Starting kubelet.service... May 10 00:42:42.131757 systemd[1]: Starting motdgen.service... May 10 00:42:42.135930 systemd[1]: Started nvidia.service. May 10 00:42:42.142012 systemd[1]: Starting prepare-helm.service... May 10 00:42:42.146266 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 00:42:42.151179 systemd[1]: Starting sshd-keygen.service... May 10 00:42:42.160802 systemd[1]: Starting systemd-logind.service... May 10 00:42:42.164367 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:42:42.164507 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 10 00:42:42.165426 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 10 00:42:42.166483 systemd[1]: Starting update-engine.service... May 10 00:42:42.173334 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 00:42:42.185437 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 00:42:42.185734 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 00:42:42.226669 jq[1388]: false May 10 00:42:42.227444 jq[1401]: true May 10 00:42:42.231585 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 00:42:42.231896 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 00:42:42.241723 systemd[1]: motdgen.service: Deactivated successfully. May 10 00:42:42.241921 systemd[1]: Finished motdgen.service. May 10 00:42:42.254535 extend-filesystems[1389]: Found loop1 May 10 00:42:42.260185 jq[1418]: true May 10 00:42:42.268235 extend-filesystems[1389]: Found sda May 10 00:42:42.270281 extend-filesystems[1389]: Found sda1 May 10 00:42:42.270281 extend-filesystems[1389]: Found sda2 May 10 00:42:42.270281 extend-filesystems[1389]: Found sda3 May 10 00:42:42.270281 extend-filesystems[1389]: Found usr May 10 00:42:42.270281 extend-filesystems[1389]: Found sda4 May 10 00:42:42.270281 extend-filesystems[1389]: Found sda6 May 10 00:42:42.270281 extend-filesystems[1389]: Found sda7 May 10 00:42:42.270281 extend-filesystems[1389]: Found sda9 May 10 00:42:42.270281 extend-filesystems[1389]: Checking size of /dev/sda9 May 10 00:42:42.310979 tar[1404]: linux-amd64/helm May 10 00:42:42.331620 env[1417]: time="2025-05-10T00:42:42.331561891Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 00:42:42.365220 extend-filesystems[1389]: Old size kept for /dev/sda9 May 10 00:42:42.367545 extend-filesystems[1389]: Found sr0 May 10 00:42:42.372558 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 00:42:42.372768 systemd[1]: Finished extend-filesystems.service. May 10 00:42:42.376846 dbus-daemon[1387]: [system] SELinux support is enabled May 10 00:42:42.377025 systemd[1]: Started dbus.service. May 10 00:42:42.382626 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 00:42:42.382659 systemd[1]: Reached target system-config.target. May 10 00:42:42.384761 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 00:42:42.384785 systemd[1]: Reached target user-config.target. May 10 00:42:42.431359 bash[1440]: Updated "/home/core/.ssh/authorized_keys" May 10 00:42:42.432040 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 00:42:42.437186 systemd-logind[1398]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 00:42:42.443821 systemd-logind[1398]: New seat seat0. May 10 00:42:42.448949 systemd[1]: Started systemd-logind.service. May 10 00:42:42.508826 env[1417]: time="2025-05-10T00:42:42.508541966Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 00:42:42.508826 env[1417]: time="2025-05-10T00:42:42.508725164Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 00:42:42.518398 env[1417]: time="2025-05-10T00:42:42.517849759Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 00:42:42.518398 env[1417]: time="2025-05-10T00:42:42.517906559Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 00:42:42.518934 env[1417]: time="2025-05-10T00:42:42.518890047Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:42:42.518934 env[1417]: time="2025-05-10T00:42:42.518931947Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 00:42:42.519077 env[1417]: time="2025-05-10T00:42:42.518951647Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 00:42:42.519077 env[1417]: time="2025-05-10T00:42:42.518964746Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 00:42:42.519156 env[1417]: time="2025-05-10T00:42:42.519086045Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 00:42:42.519426 env[1417]: time="2025-05-10T00:42:42.519397442Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 00:42:42.519639 env[1417]: time="2025-05-10T00:42:42.519611339Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:42:42.519708 env[1417]: time="2025-05-10T00:42:42.519641639Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 00:42:42.519754 env[1417]: time="2025-05-10T00:42:42.519716038Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 00:42:42.519754 env[1417]: time="2025-05-10T00:42:42.519732838Z" level=info msg="metadata content store policy set" policy=shared May 10 00:42:42.541298 systemd[1]: nvidia.service: Deactivated successfully. May 10 00:42:42.554276 env[1417]: time="2025-05-10T00:42:42.552524662Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 00:42:42.554276 env[1417]: time="2025-05-10T00:42:42.552581862Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 00:42:42.554276 env[1417]: time="2025-05-10T00:42:42.552603562Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 00:42:42.554276 env[1417]: time="2025-05-10T00:42:42.552651161Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 00:42:42.554276 env[1417]: time="2025-05-10T00:42:42.552672461Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 00:42:42.554276 env[1417]: time="2025-05-10T00:42:42.552691361Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 00:42:42.554276 env[1417]: time="2025-05-10T00:42:42.552710360Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 00:42:42.554276 env[1417]: time="2025-05-10T00:42:42.552751060Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 00:42:42.554276 env[1417]: time="2025-05-10T00:42:42.552769860Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 00:42:42.554276 env[1417]: time="2025-05-10T00:42:42.552788459Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 00:42:42.554276 env[1417]: time="2025-05-10T00:42:42.552806459Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 00:42:42.554276 env[1417]: time="2025-05-10T00:42:42.552823959Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 00:42:42.554276 env[1417]: time="2025-05-10T00:42:42.552976957Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 00:42:42.554276 env[1417]: time="2025-05-10T00:42:42.553069756Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 00:42:42.558227 env[1417]: time="2025-05-10T00:42:42.556626416Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 00:42:42.558227 env[1417]: time="2025-05-10T00:42:42.556685215Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 00:42:42.558227 env[1417]: time="2025-05-10T00:42:42.556705315Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 00:42:42.558227 env[1417]: time="2025-05-10T00:42:42.556768114Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 00:42:42.558227 env[1417]: time="2025-05-10T00:42:42.556788714Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 00:42:42.558227 env[1417]: time="2025-05-10T00:42:42.556807513Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 00:42:42.558227 env[1417]: time="2025-05-10T00:42:42.556823413Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 00:42:42.558227 env[1417]: time="2025-05-10T00:42:42.556841113Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 00:42:42.558227 env[1417]: time="2025-05-10T00:42:42.556859313Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 00:42:42.558227 env[1417]: time="2025-05-10T00:42:42.556875013Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 00:42:42.558227 env[1417]: time="2025-05-10T00:42:42.556891412Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 00:42:42.558227 env[1417]: time="2025-05-10T00:42:42.556912712Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 00:42:42.558227 env[1417]: time="2025-05-10T00:42:42.557086810Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 00:42:42.558227 env[1417]: time="2025-05-10T00:42:42.557106110Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 00:42:42.558227 env[1417]: time="2025-05-10T00:42:42.557124610Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 00:42:42.558921 env[1417]: time="2025-05-10T00:42:42.557141110Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 00:42:42.558921 env[1417]: time="2025-05-10T00:42:42.557161909Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 00:42:42.558921 env[1417]: time="2025-05-10T00:42:42.557176209Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 00:42:42.558921 env[1417]: time="2025-05-10T00:42:42.557201709Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 00:42:42.558921 env[1417]: time="2025-05-10T00:42:42.557273408Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 00:42:42.559110 env[1417]: time="2025-05-10T00:42:42.557528105Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 00:42:42.559110 env[1417]: time="2025-05-10T00:42:42.557608804Z" level=info msg="Connect containerd service" May 10 00:42:42.559110 env[1417]: time="2025-05-10T00:42:42.557672704Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 00:42:42.584871 env[1417]: time="2025-05-10T00:42:42.559653281Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:42:42.584871 env[1417]: time="2025-05-10T00:42:42.559911378Z" level=info msg="Start subscribing containerd event" May 10 00:42:42.584871 env[1417]: time="2025-05-10T00:42:42.559965377Z" level=info msg="Start recovering state" May 10 00:42:42.584871 env[1417]: time="2025-05-10T00:42:42.560035477Z" level=info msg="Start event monitor" May 10 00:42:42.584871 env[1417]: time="2025-05-10T00:42:42.560048676Z" level=info msg="Start snapshots syncer" May 10 00:42:42.584871 env[1417]: time="2025-05-10T00:42:42.560060076Z" level=info msg="Start cni network conf syncer for default" May 10 00:42:42.584871 env[1417]: time="2025-05-10T00:42:42.560071776Z" level=info msg="Start streaming server" May 10 00:42:42.584871 env[1417]: time="2025-05-10T00:42:42.560338773Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 00:42:42.584871 env[1417]: time="2025-05-10T00:42:42.560388972Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 00:42:42.584871 env[1417]: time="2025-05-10T00:42:42.564542525Z" level=info msg="containerd successfully booted in 0.234018s" May 10 00:42:42.560534 systemd[1]: Started containerd.service. May 10 00:42:42.910650 update_engine[1400]: I0510 00:42:42.909754 1400 main.cc:92] Flatcar Update Engine starting May 10 00:42:42.951913 systemd[1]: Started update-engine.service. May 10 00:42:42.953644 update_engine[1400]: I0510 00:42:42.953526 1400 update_check_scheduler.cc:74] Next update check in 5m8s May 10 00:42:42.956859 systemd[1]: Started locksmithd.service. May 10 00:42:43.156866 tar[1404]: linux-amd64/LICENSE May 10 00:42:43.157049 tar[1404]: linux-amd64/README.md May 10 00:42:43.164000 systemd[1]: Finished prepare-helm.service. May 10 00:42:43.507056 sshd_keygen[1419]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 00:42:43.538759 systemd[1]: Finished sshd-keygen.service. May 10 00:42:43.543034 systemd[1]: Starting issuegen.service... May 10 00:42:43.546444 systemd[1]: Started waagent.service. May 10 00:42:43.552029 systemd[1]: issuegen.service: Deactivated successfully. May 10 00:42:43.552261 systemd[1]: Finished issuegen.service. May 10 00:42:43.556210 systemd[1]: Starting systemd-user-sessions.service... May 10 00:42:43.564432 systemd[1]: Finished systemd-user-sessions.service. May 10 00:42:43.568842 systemd[1]: Started getty@tty1.service. May 10 00:42:43.572989 systemd[1]: Started serial-getty@ttyS0.service. May 10 00:42:43.575697 systemd[1]: Reached target getty.target. May 10 00:42:43.654685 systemd[1]: Started kubelet.service. May 10 00:42:43.657797 systemd[1]: Reached target multi-user.target. May 10 00:42:43.662669 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 00:42:43.672171 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 00:42:43.672399 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 00:42:43.675030 systemd[1]: Startup finished in 744ms (firmware) + 23.232s (loader) + 947ms (kernel) + 12.135s (initrd) + 19.352s (userspace) = 56.413s. May 10 00:42:43.988704 login[1510]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 10 00:42:43.991438 login[1511]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 10 00:42:44.016513 systemd[1]: Created slice user-500.slice. May 10 00:42:44.018096 systemd[1]: Starting user-runtime-dir@500.service... May 10 00:42:44.023347 systemd-logind[1398]: New session 1 of user core. May 10 00:42:44.029074 systemd-logind[1398]: New session 2 of user core. May 10 00:42:44.035550 systemd[1]: Finished user-runtime-dir@500.service. May 10 00:42:44.037969 systemd[1]: Starting user@500.service... May 10 00:42:44.058129 (systemd)[1523]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 00:42:44.227043 systemd[1523]: Queued start job for default target default.target. May 10 00:42:44.228138 systemd[1523]: Reached target paths.target. May 10 00:42:44.228166 systemd[1523]: Reached target sockets.target. May 10 00:42:44.228183 systemd[1523]: Reached target timers.target. May 10 00:42:44.228199 systemd[1523]: Reached target basic.target. May 10 00:42:44.228340 systemd[1]: Started user@500.service. May 10 00:42:44.229324 systemd[1523]: Reached target default.target. May 10 00:42:44.229381 systemd[1523]: Startup finished in 162ms. May 10 00:42:44.229597 systemd[1]: Started session-1.scope. May 10 00:42:44.230206 systemd[1]: Started session-2.scope. May 10 00:42:44.297399 locksmithd[1494]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 00:42:44.376451 kubelet[1516]: E0510 00:42:44.376412 1516 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:42:44.378495 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:42:44.378673 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:42:44.378950 systemd[1]: kubelet.service: Consumed 1.081s CPU time. May 10 00:42:49.454414 waagent[1504]: 2025-05-10T00:42:49.454286Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 May 10 00:42:49.459380 waagent[1504]: 2025-05-10T00:42:49.458868Z INFO Daemon Daemon OS: flatcar 3510.3.7 May 10 00:42:49.462385 waagent[1504]: 2025-05-10T00:42:49.462216Z INFO Daemon Daemon Python: 3.9.16 May 10 00:42:49.463743 waagent[1504]: 2025-05-10T00:42:49.463672Z INFO Daemon Daemon Run daemon May 10 00:42:49.465230 waagent[1504]: 2025-05-10T00:42:49.465172Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.7' May 10 00:42:49.480073 waagent[1504]: 2025-05-10T00:42:49.479923Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 10 00:42:49.499323 waagent[1504]: 2025-05-10T00:42:49.499157Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 10 00:42:49.528004 waagent[1504]: 2025-05-10T00:42:49.500896Z INFO Daemon Daemon cloud-init is enabled: False May 10 00:42:49.528004 waagent[1504]: 2025-05-10T00:42:49.501722Z INFO Daemon Daemon Using waagent for provisioning May 10 00:42:49.528004 waagent[1504]: 2025-05-10T00:42:49.504925Z INFO Daemon Daemon Activate resource disk May 10 00:42:49.528004 waagent[1504]: 2025-05-10T00:42:49.505570Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb May 10 00:42:49.528004 waagent[1504]: 2025-05-10T00:42:49.513443Z INFO Daemon Daemon Found device: None May 10 00:42:49.528004 waagent[1504]: 2025-05-10T00:42:49.514290Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology May 10 00:42:49.528004 waagent[1504]: 2025-05-10T00:42:49.515040Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 May 10 00:42:49.528004 waagent[1504]: 2025-05-10T00:42:49.516741Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 10 00:42:49.528004 waagent[1504]: 2025-05-10T00:42:49.517648Z INFO Daemon Daemon Running default provisioning handler May 10 00:42:49.530812 waagent[1504]: 2025-05-10T00:42:49.530663Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 10 00:42:49.537490 waagent[1504]: 2025-05-10T00:42:49.537359Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 10 00:42:49.545414 waagent[1504]: 2025-05-10T00:42:49.538949Z INFO Daemon Daemon cloud-init is enabled: False May 10 00:42:49.545414 waagent[1504]: 2025-05-10T00:42:49.539632Z INFO Daemon Daemon Copying ovf-env.xml May 10 00:42:49.598628 waagent[1504]: 2025-05-10T00:42:49.594735Z INFO Daemon Daemon Successfully mounted dvd May 10 00:42:49.652513 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. May 10 00:42:49.680326 waagent[1504]: 2025-05-10T00:42:49.680130Z INFO Daemon Daemon Detect protocol endpoint May 10 00:42:49.684613 waagent[1504]: 2025-05-10T00:42:49.684459Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 10 00:42:49.689583 waagent[1504]: 2025-05-10T00:42:49.689362Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler May 10 00:42:49.700639 waagent[1504]: 2025-05-10T00:42:49.692221Z INFO Daemon Daemon Test for route to 168.63.129.16 May 10 00:42:49.700639 waagent[1504]: 2025-05-10T00:42:49.696093Z INFO Daemon Daemon Route to 168.63.129.16 exists May 10 00:42:49.700639 waagent[1504]: 2025-05-10T00:42:49.699986Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 May 10 00:42:49.790143 waagent[1504]: 2025-05-10T00:42:49.789961Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 May 10 00:42:49.799122 waagent[1504]: 2025-05-10T00:42:49.793420Z INFO Daemon Daemon Wire protocol version:2012-11-30 May 10 00:42:49.799122 waagent[1504]: 2025-05-10T00:42:49.794773Z INFO Daemon Daemon Server preferred version:2015-04-05 May 10 00:42:50.437571 waagent[1504]: 2025-05-10T00:42:50.437413Z INFO Daemon Daemon Initializing goal state during protocol detection May 10 00:42:50.448025 waagent[1504]: 2025-05-10T00:42:50.447937Z INFO Daemon Daemon Forcing an update of the goal state.. May 10 00:42:50.454848 waagent[1504]: 2025-05-10T00:42:50.449075Z INFO Daemon Daemon Fetching goal state [incarnation 1] May 10 00:42:50.542844 waagent[1504]: 2025-05-10T00:42:50.542709Z INFO Daemon Daemon Found private key matching thumbprint 7D452A34F6313B7026F021F5DB915E179FC4B411 May 10 00:42:50.547717 waagent[1504]: 2025-05-10T00:42:50.547612Z INFO Daemon Daemon Certificate with thumbprint 38AC796ECD5A6420071B1CE9D14E84F94F0A9A08 has no matching private key. May 10 00:42:50.553842 waagent[1504]: 2025-05-10T00:42:50.548948Z INFO Daemon Daemon Fetch goal state completed May 10 00:42:50.577085 waagent[1504]: 2025-05-10T00:42:50.576991Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 9d5da533-bfc3-4975-9f3f-3c07e768a939 New eTag: 12869518755523161475] May 10 00:42:50.584195 waagent[1504]: 2025-05-10T00:42:50.578796Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob May 10 00:42:50.590993 waagent[1504]: 2025-05-10T00:42:50.590926Z INFO Daemon Daemon Starting provisioning May 10 00:42:50.597754 waagent[1504]: 2025-05-10T00:42:50.592188Z INFO Daemon Daemon Handle ovf-env.xml. May 10 00:42:50.597754 waagent[1504]: 2025-05-10T00:42:50.593292Z INFO Daemon Daemon Set hostname [ci-3510.3.7-n-d5b055839e] May 10 00:42:50.609837 waagent[1504]: 2025-05-10T00:42:50.609698Z INFO Daemon Daemon Publish hostname [ci-3510.3.7-n-d5b055839e] May 10 00:42:50.616960 waagent[1504]: 2025-05-10T00:42:50.611220Z INFO Daemon Daemon Examine /proc/net/route for primary interface May 10 00:42:50.616960 waagent[1504]: 2025-05-10T00:42:50.612566Z INFO Daemon Daemon Primary interface is [eth0] May 10 00:42:50.625998 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. May 10 00:42:50.626266 systemd[1]: Stopped systemd-networkd-wait-online.service. May 10 00:42:50.626341 systemd[1]: Stopping systemd-networkd-wait-online.service... May 10 00:42:50.626652 systemd[1]: Stopping systemd-networkd.service... May 10 00:42:50.630298 systemd-networkd[1171]: eth0: DHCPv6 lease lost May 10 00:42:50.631674 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:42:50.631827 systemd[1]: Stopped systemd-networkd.service. May 10 00:42:50.634272 systemd[1]: Starting systemd-networkd.service... May 10 00:42:50.666408 systemd-networkd[1571]: enP50873s1: Link UP May 10 00:42:50.666419 systemd-networkd[1571]: enP50873s1: Gained carrier May 10 00:42:50.667756 systemd-networkd[1571]: eth0: Link UP May 10 00:42:50.667765 systemd-networkd[1571]: eth0: Gained carrier May 10 00:42:50.668192 systemd-networkd[1571]: lo: Link UP May 10 00:42:50.668201 systemd-networkd[1571]: lo: Gained carrier May 10 00:42:50.668687 systemd-networkd[1571]: eth0: Gained IPv6LL May 10 00:42:50.668968 systemd-networkd[1571]: Enumeration completed May 10 00:42:50.669093 systemd[1]: Started systemd-networkd.service. May 10 00:42:50.671348 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:42:50.676358 waagent[1504]: 2025-05-10T00:42:50.671228Z INFO Daemon Daemon Create user account if not exists May 10 00:42:50.677240 waagent[1504]: 2025-05-10T00:42:50.677121Z INFO Daemon Daemon User core already exists, skip useradd May 10 00:42:50.681416 waagent[1504]: 2025-05-10T00:42:50.681119Z INFO Daemon Daemon Configure sudoer May 10 00:42:50.683216 systemd-networkd[1571]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:42:50.684222 waagent[1504]: 2025-05-10T00:42:50.684118Z INFO Daemon Daemon Configure sshd May 10 00:42:50.688161 waagent[1504]: 2025-05-10T00:42:50.685692Z INFO Daemon Daemon Deploy ssh public key. May 10 00:42:50.718370 systemd-networkd[1571]: eth0: DHCPv4 address 10.200.8.40/24, gateway 10.200.8.1 acquired from 168.63.129.16 May 10 00:42:50.721661 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 00:42:51.805099 waagent[1504]: 2025-05-10T00:42:51.805004Z INFO Daemon Daemon Provisioning complete May 10 00:42:51.827878 waagent[1504]: 2025-05-10T00:42:51.827776Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping May 10 00:42:51.832930 waagent[1504]: 2025-05-10T00:42:51.832809Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. May 10 00:42:51.843584 waagent[1504]: 2025-05-10T00:42:51.839206Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent May 10 00:42:52.166241 waagent[1580]: 2025-05-10T00:42:52.166106Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent May 10 00:42:52.167084 waagent[1580]: 2025-05-10T00:42:52.167012Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 10 00:42:52.167236 waagent[1580]: 2025-05-10T00:42:52.167177Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 10 00:42:52.185417 waagent[1580]: 2025-05-10T00:42:52.185303Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. May 10 00:42:52.185648 waagent[1580]: 2025-05-10T00:42:52.185585Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] May 10 00:42:52.260127 waagent[1580]: 2025-05-10T00:42:52.259982Z INFO ExtHandler ExtHandler Found private key matching thumbprint 7D452A34F6313B7026F021F5DB915E179FC4B411 May 10 00:42:52.260398 waagent[1580]: 2025-05-10T00:42:52.260336Z INFO ExtHandler ExtHandler Certificate with thumbprint 38AC796ECD5A6420071B1CE9D14E84F94F0A9A08 has no matching private key. May 10 00:42:52.260650 waagent[1580]: 2025-05-10T00:42:52.260599Z INFO ExtHandler ExtHandler Fetch goal state completed May 10 00:42:52.276724 waagent[1580]: 2025-05-10T00:42:52.276653Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 7745e311-fe72-4387-acaa-63065261b919 New eTag: 12869518755523161475] May 10 00:42:52.277351 waagent[1580]: 2025-05-10T00:42:52.277285Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob May 10 00:42:52.339392 waagent[1580]: 2025-05-10T00:42:52.339216Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; May 10 00:42:52.362005 waagent[1580]: 2025-05-10T00:42:52.361882Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1580 May 10 00:42:52.365702 waagent[1580]: 2025-05-10T00:42:52.365612Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 10 00:42:52.367000 waagent[1580]: 2025-05-10T00:42:52.366930Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules May 10 00:42:52.433590 waagent[1580]: 2025-05-10T00:42:52.433358Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 10 00:42:52.434007 waagent[1580]: 2025-05-10T00:42:52.433933Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 10 00:42:52.442991 waagent[1580]: 2025-05-10T00:42:52.442921Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 10 00:42:52.443593 waagent[1580]: 2025-05-10T00:42:52.443518Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 10 00:42:52.444766 waagent[1580]: 2025-05-10T00:42:52.444692Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] May 10 00:42:52.446158 waagent[1580]: 2025-05-10T00:42:52.446092Z INFO ExtHandler ExtHandler Starting env monitor service. May 10 00:42:52.446620 waagent[1580]: 2025-05-10T00:42:52.446561Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 10 00:42:52.446776 waagent[1580]: 2025-05-10T00:42:52.446728Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 10 00:42:52.447363 waagent[1580]: 2025-05-10T00:42:52.447296Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 10 00:42:52.447744 waagent[1580]: 2025-05-10T00:42:52.447688Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 10 00:42:52.449852 waagent[1580]: 2025-05-10T00:42:52.449405Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 10 00:42:52.449852 waagent[1580]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 10 00:42:52.449852 waagent[1580]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 May 10 00:42:52.449852 waagent[1580]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 10 00:42:52.449852 waagent[1580]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 10 00:42:52.449852 waagent[1580]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 10 00:42:52.449852 waagent[1580]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 10 00:42:52.450196 waagent[1580]: 2025-05-10T00:42:52.449911Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 10 00:42:52.450196 waagent[1580]: 2025-05-10T00:42:52.450151Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 10 00:42:52.451911 waagent[1580]: 2025-05-10T00:42:52.451843Z INFO EnvHandler ExtHandler Configure routes May 10 00:42:52.452517 waagent[1580]: 2025-05-10T00:42:52.452460Z INFO EnvHandler ExtHandler Gateway:None May 10 00:42:52.452779 waagent[1580]: 2025-05-10T00:42:52.452718Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 10 00:42:52.453154 waagent[1580]: 2025-05-10T00:42:52.453062Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 10 00:42:52.456400 waagent[1580]: 2025-05-10T00:42:52.456139Z INFO EnvHandler ExtHandler Routes:None May 10 00:42:52.458124 waagent[1580]: 2025-05-10T00:42:52.458022Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 10 00:42:52.459447 waagent[1580]: 2025-05-10T00:42:52.459366Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 10 00:42:52.462327 waagent[1580]: 2025-05-10T00:42:52.462239Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 10 00:42:52.472141 waagent[1580]: 2025-05-10T00:42:52.472068Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) May 10 00:42:52.474707 waagent[1580]: 2025-05-10T00:42:52.474631Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 10 00:42:52.477139 waagent[1580]: 2025-05-10T00:42:52.477066Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' May 10 00:42:52.506055 waagent[1580]: 2025-05-10T00:42:52.505949Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1571' May 10 00:42:52.546481 waagent[1580]: 2025-05-10T00:42:52.546396Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. May 10 00:42:52.574957 waagent[1580]: 2025-05-10T00:42:52.574786Z INFO MonitorHandler ExtHandler Network interfaces: May 10 00:42:52.574957 waagent[1580]: Executing ['ip', '-a', '-o', 'link']: May 10 00:42:52.574957 waagent[1580]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 10 00:42:52.574957 waagent[1580]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:35:cf:ec brd ff:ff:ff:ff:ff:ff May 10 00:42:52.574957 waagent[1580]: 3: enP50873s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:35:cf:ec brd ff:ff:ff:ff:ff:ff\ altname enP50873p0s2 May 10 00:42:52.574957 waagent[1580]: Executing ['ip', '-4', '-a', '-o', 'address']: May 10 00:42:52.574957 waagent[1580]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 10 00:42:52.574957 waagent[1580]: 2: eth0 inet 10.200.8.40/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever May 10 00:42:52.574957 waagent[1580]: Executing ['ip', '-6', '-a', '-o', 'address']: May 10 00:42:52.574957 waagent[1580]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 10 00:42:52.574957 waagent[1580]: 2: eth0 inet6 fe80::7e1e:52ff:fe35:cfec/64 scope link \ valid_lft forever preferred_lft forever May 10 00:42:52.749340 waagent[1580]: 2025-05-10T00:42:52.749182Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.13.1.1 -- exiting May 10 00:42:52.842661 waagent[1504]: 2025-05-10T00:42:52.842499Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running May 10 00:42:52.848193 waagent[1504]: 2025-05-10T00:42:52.848102Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.13.1.1 to be the latest agent May 10 00:42:54.006147 waagent[1615]: 2025-05-10T00:42:54.006024Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.13.1.1) May 10 00:42:54.007594 waagent[1615]: 2025-05-10T00:42:54.007519Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.7 May 10 00:42:54.007733 waagent[1615]: 2025-05-10T00:42:54.007685Z INFO ExtHandler ExtHandler Python: 3.9.16 May 10 00:42:54.007889 waagent[1615]: 2025-05-10T00:42:54.007835Z INFO ExtHandler ExtHandler CPU Arch: x86_64 May 10 00:42:54.024695 waagent[1615]: 2025-05-10T00:42:54.024554Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; May 10 00:42:54.025168 waagent[1615]: 2025-05-10T00:42:54.025092Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 10 00:42:54.025356 waagent[1615]: 2025-05-10T00:42:54.025304Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 10 00:42:54.025600 waagent[1615]: 2025-05-10T00:42:54.025550Z INFO ExtHandler ExtHandler Initializing the goal state... May 10 00:42:54.039074 waagent[1615]: 2025-05-10T00:42:54.038959Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] May 10 00:42:54.053075 waagent[1615]: 2025-05-10T00:42:54.052982Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.164 May 10 00:42:54.054265 waagent[1615]: 2025-05-10T00:42:54.054182Z INFO ExtHandler May 10 00:42:54.054447 waagent[1615]: 2025-05-10T00:42:54.054388Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 4b977494-f34a-43f3-9342-2ebb0705cab8 eTag: 12869518755523161475 source: Fabric] May 10 00:42:54.055202 waagent[1615]: 2025-05-10T00:42:54.055140Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. May 10 00:42:54.056386 waagent[1615]: 2025-05-10T00:42:54.056325Z INFO ExtHandler May 10 00:42:54.056522 waagent[1615]: 2025-05-10T00:42:54.056470Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] May 10 00:42:54.065642 waagent[1615]: 2025-05-10T00:42:54.065561Z INFO ExtHandler ExtHandler Downloading artifacts profile blob May 10 00:42:54.066216 waagent[1615]: 2025-05-10T00:42:54.066163Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 10 00:42:54.097671 waagent[1615]: 2025-05-10T00:42:54.097590Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. May 10 00:42:54.176848 waagent[1615]: 2025-05-10T00:42:54.176694Z INFO ExtHandler Downloaded certificate {'thumbprint': '7D452A34F6313B7026F021F5DB915E179FC4B411', 'hasPrivateKey': True} May 10 00:42:54.177894 waagent[1615]: 2025-05-10T00:42:54.177825Z INFO ExtHandler Downloaded certificate {'thumbprint': '38AC796ECD5A6420071B1CE9D14E84F94F0A9A08', 'hasPrivateKey': False} May 10 00:42:54.178899 waagent[1615]: 2025-05-10T00:42:54.178838Z INFO ExtHandler Fetch goal state from WireServer completed May 10 00:42:54.179730 waagent[1615]: 2025-05-10T00:42:54.179670Z INFO ExtHandler ExtHandler Goal state initialization completed. May 10 00:42:54.203437 waagent[1615]: 2025-05-10T00:42:54.203294Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) May 10 00:42:54.213011 waagent[1615]: 2025-05-10T00:42:54.212877Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 10 00:42:54.217212 waagent[1615]: 2025-05-10T00:42:54.217092Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] May 10 00:42:54.217483 waagent[1615]: 2025-05-10T00:42:54.217424Z INFO ExtHandler ExtHandler Checking state of the firewall May 10 00:42:54.244954 waagent[1615]: 2025-05-10T00:42:54.244807Z WARNING ExtHandler ExtHandler The firewall rules for Azure Fabric are not setup correctly (the environment thread will fix it): The following rules are missing: ['ACCEPT DNS', 'DROP'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n', 'iptables: Bad rule (does a matching rule exist in that chain?).\n']. Current state: May 10 00:42:54.244954 waagent[1615]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 10 00:42:54.244954 waagent[1615]: pkts bytes target prot opt in out source destination May 10 00:42:54.244954 waagent[1615]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 10 00:42:54.244954 waagent[1615]: pkts bytes target prot opt in out source destination May 10 00:42:54.244954 waagent[1615]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 10 00:42:54.244954 waagent[1615]: pkts bytes target prot opt in out source destination May 10 00:42:54.244954 waagent[1615]: 55 7861 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 10 00:42:54.246141 waagent[1615]: 2025-05-10T00:42:54.246069Z INFO ExtHandler ExtHandler Setting up persistent firewall rules May 10 00:42:54.249135 waagent[1615]: 2025-05-10T00:42:54.249017Z INFO ExtHandler ExtHandler The firewalld service is not present on the system May 10 00:42:54.249416 waagent[1615]: 2025-05-10T00:42:54.249362Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 10 00:42:54.249792 waagent[1615]: 2025-05-10T00:42:54.249734Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 10 00:42:54.258929 waagent[1615]: 2025-05-10T00:42:54.258797Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 10 00:42:54.259504 waagent[1615]: 2025-05-10T00:42:54.259428Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 10 00:42:54.271104 waagent[1615]: 2025-05-10T00:42:54.270984Z INFO ExtHandler ExtHandler WALinuxAgent-2.13.1.1 running as process 1615 May 10 00:42:54.276626 waagent[1615]: 2025-05-10T00:42:54.276512Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 10 00:42:54.277771 waagent[1615]: 2025-05-10T00:42:54.277676Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled May 10 00:42:54.278885 waagent[1615]: 2025-05-10T00:42:54.278811Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False May 10 00:42:54.282186 waagent[1615]: 2025-05-10T00:42:54.282092Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] May 10 00:42:54.283932 waagent[1615]: 2025-05-10T00:42:54.283847Z INFO ExtHandler ExtHandler Starting env monitor service. May 10 00:42:54.284502 waagent[1615]: 2025-05-10T00:42:54.284431Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 10 00:42:54.284695 waagent[1615]: 2025-05-10T00:42:54.284638Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 10 00:42:54.285341 waagent[1615]: 2025-05-10T00:42:54.285268Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 10 00:42:54.285793 waagent[1615]: 2025-05-10T00:42:54.285727Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 10 00:42:54.286519 waagent[1615]: 2025-05-10T00:42:54.286454Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 10 00:42:54.286519 waagent[1615]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 10 00:42:54.286519 waagent[1615]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 May 10 00:42:54.286519 waagent[1615]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 10 00:42:54.286519 waagent[1615]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 10 00:42:54.286519 waagent[1615]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 10 00:42:54.286519 waagent[1615]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 10 00:42:54.286891 waagent[1615]: 2025-05-10T00:42:54.286557Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 10 00:42:54.286891 waagent[1615]: 2025-05-10T00:42:54.286744Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 10 00:42:54.287302 waagent[1615]: 2025-05-10T00:42:54.287194Z INFO EnvHandler ExtHandler Configure routes May 10 00:42:54.288285 waagent[1615]: 2025-05-10T00:42:54.288165Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 10 00:42:54.288659 waagent[1615]: 2025-05-10T00:42:54.288593Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 10 00:42:54.288948 waagent[1615]: 2025-05-10T00:42:54.288896Z INFO EnvHandler ExtHandler Gateway:None May 10 00:42:54.291735 waagent[1615]: 2025-05-10T00:42:54.291653Z INFO EnvHandler ExtHandler Routes:None May 10 00:42:54.293307 waagent[1615]: 2025-05-10T00:42:54.293229Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 10 00:42:54.295412 waagent[1615]: 2025-05-10T00:42:54.295304Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 10 00:42:54.296377 waagent[1615]: 2025-05-10T00:42:54.296302Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 10 00:42:54.319302 waagent[1615]: 2025-05-10T00:42:54.319158Z INFO MonitorHandler ExtHandler Network interfaces: May 10 00:42:54.319302 waagent[1615]: Executing ['ip', '-a', '-o', 'link']: May 10 00:42:54.319302 waagent[1615]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 10 00:42:54.319302 waagent[1615]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:35:cf:ec brd ff:ff:ff:ff:ff:ff May 10 00:42:54.319302 waagent[1615]: 3: enP50873s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:35:cf:ec brd ff:ff:ff:ff:ff:ff\ altname enP50873p0s2 May 10 00:42:54.319302 waagent[1615]: Executing ['ip', '-4', '-a', '-o', 'address']: May 10 00:42:54.319302 waagent[1615]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 10 00:42:54.319302 waagent[1615]: 2: eth0 inet 10.200.8.40/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever May 10 00:42:54.319302 waagent[1615]: Executing ['ip', '-6', '-a', '-o', 'address']: May 10 00:42:54.319302 waagent[1615]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 10 00:42:54.319302 waagent[1615]: 2: eth0 inet6 fe80::7e1e:52ff:fe35:cfec/64 scope link \ valid_lft forever preferred_lft forever May 10 00:42:54.320732 waagent[1615]: 2025-05-10T00:42:54.320653Z INFO ExtHandler ExtHandler Downloading agent manifest May 10 00:42:54.321614 waagent[1615]: 2025-05-10T00:42:54.321416Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 10 00:42:54.365287 waagent[1615]: 2025-05-10T00:42:54.365156Z WARNING EnvHandler ExtHandler The firewall is not configured correctly. The following rules are missing: ['ACCEPT DNS', 'DROP'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n', 'iptables: Bad rule (does a matching rule exist in that chain?).\n']. Will reset it. Current state: May 10 00:42:54.365287 waagent[1615]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 10 00:42:54.365287 waagent[1615]: pkts bytes target prot opt in out source destination May 10 00:42:54.365287 waagent[1615]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 10 00:42:54.365287 waagent[1615]: pkts bytes target prot opt in out source destination May 10 00:42:54.365287 waagent[1615]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 10 00:42:54.365287 waagent[1615]: pkts bytes target prot opt in out source destination May 10 00:42:54.365287 waagent[1615]: 70 10049 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 10 00:42:54.374582 waagent[1615]: 2025-05-10T00:42:54.374493Z INFO ExtHandler ExtHandler May 10 00:42:54.382697 waagent[1615]: 2025-05-10T00:42:54.382413Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 2d1253d8-aae7-4aa1-876f-ca3cb324d091 correlation f77caa1e-0d9b-4d61-a06e-c4469c816c17 created: 2025-05-10T00:41:34.181160Z] May 10 00:42:54.384521 waagent[1615]: 2025-05-10T00:42:54.384431Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. May 10 00:42:54.392973 waagent[1615]: 2025-05-10T00:42:54.392817Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 18 ms] May 10 00:42:54.404163 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 10 00:42:54.404500 systemd[1]: Stopped kubelet.service. May 10 00:42:54.404553 systemd[1]: kubelet.service: Consumed 1.081s CPU time. May 10 00:42:54.406493 systemd[1]: Starting kubelet.service... May 10 00:42:54.433355 waagent[1615]: 2025-05-10T00:42:54.433235Z INFO ExtHandler ExtHandler Looking for existing remote access users. May 10 00:42:54.442764 waagent[1615]: 2025-05-10T00:42:54.442457Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.13.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: C942A6D7-ABF2-4EAD-8F47-3DD16D84A55A;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] May 10 00:42:54.460028 waagent[1615]: 2025-05-10T00:42:54.459853Z INFO EnvHandler ExtHandler The firewall was setup successfully: May 10 00:42:54.460028 waagent[1615]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 10 00:42:54.460028 waagent[1615]: pkts bytes target prot opt in out source destination May 10 00:42:54.460028 waagent[1615]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 10 00:42:54.460028 waagent[1615]: pkts bytes target prot opt in out source destination May 10 00:42:54.460028 waagent[1615]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 10 00:42:54.460028 waagent[1615]: pkts bytes target prot opt in out source destination May 10 00:42:54.460028 waagent[1615]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 May 10 00:42:54.460028 waagent[1615]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 10 00:42:54.460028 waagent[1615]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 10 00:42:54.461945 waagent[1615]: 2025-05-10T00:42:54.461855Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 May 10 00:42:54.516549 systemd[1]: Started kubelet.service. May 10 00:42:55.148014 kubelet[1668]: E0510 00:42:55.147953 1668 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:42:55.151384 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:42:55.151555 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:43:05.154230 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 10 00:43:05.154554 systemd[1]: Stopped kubelet.service. May 10 00:43:05.156390 systemd[1]: Starting kubelet.service... May 10 00:43:05.242240 systemd[1]: Started kubelet.service. May 10 00:43:05.816893 kubelet[1679]: E0510 00:43:05.816833 1679 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:43:05.818963 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:43:05.819084 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:43:15.904308 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 10 00:43:15.904602 systemd[1]: Stopped kubelet.service. May 10 00:43:15.906697 systemd[1]: Starting kubelet.service... May 10 00:43:15.998830 systemd[1]: Started kubelet.service. May 10 00:43:16.570998 kubelet[1690]: E0510 00:43:16.570729 1690 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:43:16.573269 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:43:16.573438 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:43:21.372617 systemd[1]: Created slice system-sshd.slice. May 10 00:43:21.375163 systemd[1]: Started sshd@0-10.200.8.40:22-10.200.16.10:49222.service. May 10 00:43:22.196362 sshd[1697]: Accepted publickey for core from 10.200.16.10 port 49222 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:43:22.197936 sshd[1697]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:43:22.203561 systemd[1]: Started session-3.scope. May 10 00:43:22.204051 systemd-logind[1398]: New session 3 of user core. May 10 00:43:22.742568 systemd[1]: Started sshd@1-10.200.8.40:22-10.200.16.10:49230.service. May 10 00:43:23.369899 sshd[1702]: Accepted publickey for core from 10.200.16.10 port 49230 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:43:23.371826 sshd[1702]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:43:23.377613 systemd-logind[1398]: New session 4 of user core. May 10 00:43:23.379078 systemd[1]: Started session-4.scope. May 10 00:43:23.634670 kernel: hv_balloon: Max. dynamic memory size: 8192 MB May 10 00:43:23.822997 sshd[1702]: pam_unix(sshd:session): session closed for user core May 10 00:43:23.827841 systemd[1]: sshd@1-10.200.8.40:22-10.200.16.10:49230.service: Deactivated successfully. May 10 00:43:23.829657 systemd[1]: session-4.scope: Deactivated successfully. May 10 00:43:23.830670 systemd-logind[1398]: Session 4 logged out. Waiting for processes to exit. May 10 00:43:23.832042 systemd-logind[1398]: Removed session 4. May 10 00:43:23.931463 systemd[1]: Started sshd@2-10.200.8.40:22-10.200.16.10:49236.service. May 10 00:43:24.573416 sshd[1708]: Accepted publickey for core from 10.200.16.10 port 49236 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:43:24.575906 sshd[1708]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:43:24.591321 systemd-logind[1398]: New session 5 of user core. May 10 00:43:24.592171 systemd[1]: Started session-5.scope. May 10 00:43:25.021951 sshd[1708]: pam_unix(sshd:session): session closed for user core May 10 00:43:25.025758 systemd[1]: sshd@2-10.200.8.40:22-10.200.16.10:49236.service: Deactivated successfully. May 10 00:43:25.026956 systemd[1]: session-5.scope: Deactivated successfully. May 10 00:43:25.027868 systemd-logind[1398]: Session 5 logged out. Waiting for processes to exit. May 10 00:43:25.028930 systemd-logind[1398]: Removed session 5. May 10 00:43:25.130047 systemd[1]: Started sshd@3-10.200.8.40:22-10.200.16.10:49248.service. May 10 00:43:25.776113 sshd[1714]: Accepted publickey for core from 10.200.16.10 port 49248 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:43:25.777938 sshd[1714]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:43:25.783238 systemd[1]: Started session-6.scope. May 10 00:43:25.783822 systemd-logind[1398]: New session 6 of user core. May 10 00:43:26.233792 sshd[1714]: pam_unix(sshd:session): session closed for user core May 10 00:43:26.236670 systemd[1]: sshd@3-10.200.8.40:22-10.200.16.10:49248.service: Deactivated successfully. May 10 00:43:26.237570 systemd[1]: session-6.scope: Deactivated successfully. May 10 00:43:26.238225 systemd-logind[1398]: Session 6 logged out. Waiting for processes to exit. May 10 00:43:26.239038 systemd-logind[1398]: Removed session 6. May 10 00:43:26.341151 systemd[1]: Started sshd@4-10.200.8.40:22-10.200.16.10:49262.service. May 10 00:43:26.654219 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 10 00:43:26.654487 systemd[1]: Stopped kubelet.service. May 10 00:43:26.658925 systemd[1]: Starting kubelet.service... May 10 00:43:26.760201 systemd[1]: Started kubelet.service. May 10 00:43:26.989415 sshd[1720]: Accepted publickey for core from 10.200.16.10 port 49262 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:43:26.991125 sshd[1720]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:43:26.996290 systemd[1]: Started session-7.scope. May 10 00:43:26.996809 systemd-logind[1398]: New session 7 of user core. May 10 00:43:27.352814 kubelet[1726]: E0510 00:43:27.352660 1726 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:43:27.354708 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:43:27.354882 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:43:27.547258 sudo[1733]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 00:43:27.547637 sudo[1733]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:43:27.566548 dbus-daemon[1387]: \xd0\xed\ѠU: received setenforce notice (enforcing=-201244592) May 10 00:43:27.568560 sudo[1733]: pam_unix(sudo:session): session closed for user root May 10 00:43:27.688139 sshd[1720]: pam_unix(sshd:session): session closed for user core May 10 00:43:27.692161 systemd[1]: sshd@4-10.200.8.40:22-10.200.16.10:49262.service: Deactivated successfully. May 10 00:43:27.693320 systemd[1]: session-7.scope: Deactivated successfully. May 10 00:43:27.694125 systemd-logind[1398]: Session 7 logged out. Waiting for processes to exit. May 10 00:43:27.695177 systemd-logind[1398]: Removed session 7. May 10 00:43:27.794330 systemd[1]: Started sshd@5-10.200.8.40:22-10.200.16.10:49270.service. May 10 00:43:28.240929 update_engine[1400]: I0510 00:43:28.240857 1400 update_attempter.cc:509] Updating boot flags... May 10 00:43:28.441798 sshd[1737]: Accepted publickey for core from 10.200.16.10 port 49270 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:43:28.443231 sshd[1737]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:43:28.447668 systemd[1]: Started session-8.scope. May 10 00:43:28.448109 systemd-logind[1398]: New session 8 of user core. May 10 00:43:28.790548 sudo[1807]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 00:43:28.790954 sudo[1807]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:43:28.794693 sudo[1807]: pam_unix(sudo:session): session closed for user root May 10 00:43:28.800825 sudo[1806]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 00:43:28.801189 sudo[1806]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:43:28.811083 systemd[1]: Stopping audit-rules.service... May 10 00:43:28.811000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:43:28.813038 auditctl[1810]: No rules May 10 00:43:28.813556 systemd[1]: audit-rules.service: Deactivated successfully. May 10 00:43:28.817971 kernel: kauditd_printk_skb: 131 callbacks suppressed May 10 00:43:28.818614 kernel: audit: type=1305 audit(1746837808.811:214): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:43:28.813829 systemd[1]: Stopped audit-rules.service. May 10 00:43:28.828881 systemd[1]: Starting audit-rules.service... May 10 00:43:28.811000 audit[1810]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd45ab81b0 a2=420 a3=0 items=0 ppid=1 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:28.854321 kernel: audit: type=1300 audit(1746837808.811:214): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd45ab81b0 a2=420 a3=0 items=0 ppid=1 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:28.854459 kernel: audit: type=1327 audit(1746837808.811:214): proctitle=2F7362696E2F617564697463746C002D44 May 10 00:43:28.811000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 00:43:28.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:28.862370 augenrules[1827]: No rules May 10 00:43:28.863339 systemd[1]: Finished audit-rules.service. May 10 00:43:28.865623 kernel: audit: type=1131 audit(1746837808.811:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:28.865278 sudo[1806]: pam_unix(sudo:session): session closed for user root May 10 00:43:28.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:28.864000 audit[1806]: USER_END pid=1806 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:43:28.886745 kernel: audit: type=1130 audit(1746837808.862:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:28.886855 kernel: audit: type=1106 audit(1746837808.864:217): pid=1806 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:43:28.864000 audit[1806]: CRED_DISP pid=1806 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:43:28.887264 kernel: audit: type=1104 audit(1746837808.864:218): pid=1806 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:43:28.969136 sshd[1737]: pam_unix(sshd:session): session closed for user core May 10 00:43:28.969000 audit[1737]: USER_END pid=1737 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:43:28.972925 systemd[1]: sshd@5-10.200.8.40:22-10.200.16.10:49270.service: Deactivated successfully. May 10 00:43:28.973695 systemd[1]: session-8.scope: Deactivated successfully. May 10 00:43:28.975169 systemd-logind[1398]: Session 8 logged out. Waiting for processes to exit. May 10 00:43:28.976088 systemd-logind[1398]: Removed session 8. May 10 00:43:28.969000 audit[1737]: CRED_DISP pid=1737 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:43:28.998503 kernel: audit: type=1106 audit(1746837808.969:219): pid=1737 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:43:28.998610 kernel: audit: type=1104 audit(1746837808.969:220): pid=1737 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:43:28.998636 kernel: audit: type=1131 audit(1746837808.971:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.40:22-10.200.16.10:49270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:28.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.40:22-10.200.16.10:49270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:29.075285 systemd[1]: Started sshd@6-10.200.8.40:22-10.200.16.10:60670.service. May 10 00:43:29.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.40:22-10.200.16.10:60670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:29.713000 audit[1833]: USER_ACCT pid=1833 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:43:29.715157 sshd[1833]: Accepted publickey for core from 10.200.16.10 port 60670 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:43:29.714000 audit[1833]: CRED_ACQ pid=1833 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:43:29.714000 audit[1833]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5473eb50 a2=3 a3=0 items=0 ppid=1 pid=1833 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:29.714000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:43:29.716606 sshd[1833]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:43:29.721302 systemd[1]: Started session-9.scope. May 10 00:43:29.721988 systemd-logind[1398]: New session 9 of user core. May 10 00:43:29.724000 audit[1833]: USER_START pid=1833 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:43:29.726000 audit[1835]: CRED_ACQ pid=1835 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:43:30.064000 audit[1836]: USER_ACCT pid=1836 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:43:30.064000 audit[1836]: CRED_REFR pid=1836 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:43:30.065566 sudo[1836]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 10 00:43:30.066065 sudo[1836]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:43:30.066000 audit[1836]: USER_START pid=1836 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:43:30.095695 systemd[1]: Starting docker.service... May 10 00:43:30.132618 env[1846]: time="2025-05-10T00:43:30.132566305Z" level=info msg="Starting up" May 10 00:43:30.133861 env[1846]: time="2025-05-10T00:43:30.133833204Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:43:30.133986 env[1846]: time="2025-05-10T00:43:30.133970004Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:43:30.134070 env[1846]: time="2025-05-10T00:43:30.134056104Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:43:30.134120 env[1846]: time="2025-05-10T00:43:30.134111904Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:43:30.136080 env[1846]: time="2025-05-10T00:43:30.136053003Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:43:30.136080 env[1846]: time="2025-05-10T00:43:30.136070003Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:43:30.136227 env[1846]: time="2025-05-10T00:43:30.136088403Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:43:30.136227 env[1846]: time="2025-05-10T00:43:30.136099603Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:43:30.144103 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport965378017-merged.mount: Deactivated successfully. May 10 00:43:30.282015 env[1846]: time="2025-05-10T00:43:30.281959427Z" level=info msg="Loading containers: start." May 10 00:43:30.339000 audit[1872]: NETFILTER_CFG table=nat:7 family=2 entries=2 op=nft_register_chain pid=1872 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.339000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe730f02f0 a2=0 a3=7ffe730f02dc items=0 ppid=1846 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.339000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 10 00:43:30.341000 audit[1874]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1874 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.341000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffcb60fa070 a2=0 a3=7ffcb60fa05c items=0 ppid=1846 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.341000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 10 00:43:30.343000 audit[1876]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_chain pid=1876 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.343000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe94f33fe0 a2=0 a3=7ffe94f33fcc items=0 ppid=1846 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.343000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:43:30.345000 audit[1878]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_chain pid=1878 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.345000 audit[1878]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc192b2460 a2=0 a3=7ffc192b244c items=0 ppid=1846 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.345000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:43:30.347000 audit[1880]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_rule pid=1880 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.347000 audit[1880]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd24909340 a2=0 a3=7ffd2490932c items=0 ppid=1846 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.347000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 10 00:43:30.348000 audit[1882]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1882 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.348000 audit[1882]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff0ba2ac00 a2=0 a3=7fff0ba2abec items=0 ppid=1846 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.348000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 10 00:43:30.369000 audit[1884]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1884 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.369000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffda5940e20 a2=0 a3=7ffda5940e0c items=0 ppid=1846 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.369000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 10 00:43:30.371000 audit[1886]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_register_rule pid=1886 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.371000 audit[1886]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff7cc296e0 a2=0 a3=7fff7cc296cc items=0 ppid=1846 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.371000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 10 00:43:30.373000 audit[1888]: NETFILTER_CFG table=filter:15 family=2 entries=2 op=nft_register_chain pid=1888 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.373000 audit[1888]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd6cb3cfa0 a2=0 a3=7ffd6cb3cf8c items=0 ppid=1846 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.373000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:43:30.391000 audit[1892]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_unregister_rule pid=1892 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.391000 audit[1892]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe7debf170 a2=0 a3=7ffe7debf15c items=0 ppid=1846 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.391000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:43:30.396000 audit[1893]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_rule pid=1893 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.396000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffefac733c0 a2=0 a3=7ffefac733ac items=0 ppid=1846 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.396000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:43:30.445271 kernel: Initializing XFRM netlink socket May 10 00:43:30.477467 env[1846]: time="2025-05-10T00:43:30.477428126Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 10 00:43:30.544000 audit[1900]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.544000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffcd7454bc0 a2=0 a3=7ffcd7454bac items=0 ppid=1846 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.544000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 10 00:43:30.554000 audit[1903]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_rule pid=1903 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.554000 audit[1903]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffdaf4dba90 a2=0 a3=7ffdaf4dba7c items=0 ppid=1846 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.554000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 10 00:43:30.558000 audit[1906]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1906 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.558000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffeefe12120 a2=0 a3=7ffeefe1210c items=0 ppid=1846 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.558000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 10 00:43:30.560000 audit[1908]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1908 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.560000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdcdcc6350 a2=0 a3=7ffdcdcc633c items=0 ppid=1846 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.560000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 10 00:43:30.562000 audit[1910]: NETFILTER_CFG table=nat:22 family=2 entries=2 op=nft_register_chain pid=1910 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.562000 audit[1910]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc9b1c5290 a2=0 a3=7ffc9b1c527c items=0 ppid=1846 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.562000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 10 00:43:30.565000 audit[1912]: NETFILTER_CFG table=nat:23 family=2 entries=2 op=nft_register_chain pid=1912 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.565000 audit[1912]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe1d7e44c0 a2=0 a3=7ffe1d7e44ac items=0 ppid=1846 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.565000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 10 00:43:30.568000 audit[1914]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1914 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.568000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe860ac960 a2=0 a3=7ffe860ac94c items=0 ppid=1846 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.568000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 10 00:43:30.570000 audit[1916]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.570000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff8c16ca00 a2=0 a3=7fff8c16c9ec items=0 ppid=1846 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.570000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 10 00:43:30.573000 audit[1918]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1918 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.573000 audit[1918]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe7831ce20 a2=0 a3=7ffe7831ce0c items=0 ppid=1846 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.573000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:43:30.575000 audit[1920]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.575000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe9feb5320 a2=0 a3=7ffe9feb530c items=0 ppid=1846 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.575000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:43:30.577000 audit[1922]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1922 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.577000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc77e34370 a2=0 a3=7ffc77e3435c items=0 ppid=1846 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.577000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 10 00:43:30.579360 systemd-networkd[1571]: docker0: Link UP May 10 00:43:30.600000 audit[1926]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_unregister_rule pid=1926 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.600000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff7863b240 a2=0 a3=7fff7863b22c items=0 ppid=1846 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.600000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:43:30.606000 audit[1927]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1927 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:30.606000 audit[1927]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd228a8610 a2=0 a3=7ffd228a85fc items=0 ppid=1846 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:30.606000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:43:30.608352 env[1846]: time="2025-05-10T00:43:30.608317359Z" level=info msg="Loading containers: done." May 10 00:43:30.621986 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck868155061-merged.mount: Deactivated successfully. May 10 00:43:30.645683 env[1846]: time="2025-05-10T00:43:30.645634139Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 10 00:43:30.645917 env[1846]: time="2025-05-10T00:43:30.645880739Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 10 00:43:30.646034 env[1846]: time="2025-05-10T00:43:30.646011639Z" level=info msg="Daemon has completed initialization" May 10 00:43:30.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:30.679672 systemd[1]: Started docker.service. May 10 00:43:30.690628 env[1846]: time="2025-05-10T00:43:30.690564916Z" level=info msg="API listen on /run/docker.sock" May 10 00:43:34.549819 env[1417]: time="2025-05-10T00:43:34.549758073Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\"" May 10 00:43:35.372016 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount726498071.mount: Deactivated successfully. May 10 00:43:37.419369 kernel: kauditd_printk_skb: 84 callbacks suppressed May 10 00:43:37.419505 kernel: audit: type=1130 audit(1746837817.403:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:37.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:37.404232 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. May 10 00:43:37.404516 systemd[1]: Stopped kubelet.service. May 10 00:43:37.419045 systemd[1]: Starting kubelet.service... May 10 00:43:37.432824 kernel: audit: type=1131 audit(1746837817.403:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:37.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:37.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:37.864652 systemd[1]: Started kubelet.service. May 10 00:43:37.875266 kernel: audit: type=1130 audit(1746837817.863:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:37.910003 kubelet[1974]: E0510 00:43:37.909951 1974 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:43:37.911686 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:43:37.911841 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:43:37.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:43:37.927282 kernel: audit: type=1131 audit(1746837817.910:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:43:38.162480 env[1417]: time="2025-05-10T00:43:38.162425388Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:38.173052 env[1417]: time="2025-05-10T00:43:38.172688185Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:38.178345 env[1417]: time="2025-05-10T00:43:38.178309883Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:38.183085 env[1417]: time="2025-05-10T00:43:38.183048882Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:4878682f7a044274d42399a6316ef452c5411aafd4ad99cc57de7235ca490e4e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:38.183766 env[1417]: time="2025-05-10T00:43:38.183732382Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\" returns image reference \"sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb\"" May 10 00:43:38.194063 env[1417]: time="2025-05-10T00:43:38.194032979Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\"" May 10 00:43:40.199263 env[1417]: time="2025-05-10T00:43:40.199203987Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:40.211361 env[1417]: time="2025-05-10T00:43:40.211298784Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:40.215729 env[1417]: time="2025-05-10T00:43:40.215688683Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:40.222584 env[1417]: time="2025-05-10T00:43:40.222547281Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:3a36711d0409d565b370a18d0c19339e93d4f1b1f2b3fd382eb31c714c463b74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:40.223375 env[1417]: time="2025-05-10T00:43:40.223343981Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\" returns image reference \"sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8\"" May 10 00:43:40.234454 env[1417]: time="2025-05-10T00:43:40.234423178Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\"" May 10 00:43:41.797081 env[1417]: time="2025-05-10T00:43:41.797015768Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:41.804627 env[1417]: time="2025-05-10T00:43:41.804572266Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:41.809783 env[1417]: time="2025-05-10T00:43:41.809739664Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:41.816802 env[1417]: time="2025-05-10T00:43:41.816751663Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:521c843d01025be7d4e246ddee8cde74556eb9813c606d6db9f0f03236f6d029,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:41.818110 env[1417]: time="2025-05-10T00:43:41.818067262Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\" returns image reference \"sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d\"" May 10 00:43:41.830647 env[1417]: time="2025-05-10T00:43:41.830605259Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 10 00:43:43.205647 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3108504753.mount: Deactivated successfully. May 10 00:43:43.832601 env[1417]: time="2025-05-10T00:43:43.832534627Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:43.841535 env[1417]: time="2025-05-10T00:43:43.841478412Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:43.847027 env[1417]: time="2025-05-10T00:43:43.846958587Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:43.852841 env[1417]: time="2025-05-10T00:43:43.852778273Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:43.853344 env[1417]: time="2025-05-10T00:43:43.853293690Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b\"" May 10 00:43:43.865581 env[1417]: time="2025-05-10T00:43:43.865521380Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 10 00:43:44.485309 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3545896523.mount: Deactivated successfully. May 10 00:43:46.008256 env[1417]: time="2025-05-10T00:43:46.008180871Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:46.017503 env[1417]: time="2025-05-10T00:43:46.017442643Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:46.024196 env[1417]: time="2025-05-10T00:43:46.024131739Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:46.035156 env[1417]: time="2025-05-10T00:43:46.035086161Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:46.039361 env[1417]: time="2025-05-10T00:43:46.039307085Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 10 00:43:46.055238 env[1417]: time="2025-05-10T00:43:46.055192051Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" May 10 00:43:46.749606 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3222645292.mount: Deactivated successfully. May 10 00:43:46.774234 env[1417]: time="2025-05-10T00:43:46.774169963Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:46.782005 env[1417]: time="2025-05-10T00:43:46.781944691Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:46.788051 env[1417]: time="2025-05-10T00:43:46.787982168Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:46.801001 env[1417]: time="2025-05-10T00:43:46.800945949Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:46.801591 env[1417]: time="2025-05-10T00:43:46.801548166Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" May 10 00:43:46.812988 env[1417]: time="2025-05-10T00:43:46.812944001Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" May 10 00:43:47.397122 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1496162409.mount: Deactivated successfully. May 10 00:43:48.155010 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 6. May 10 00:43:48.185130 kernel: audit: type=1130 audit(1746837828.155:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.155331 systemd[1]: Stopped kubelet.service. May 10 00:43:48.159662 systemd[1]: Starting kubelet.service... May 10 00:43:48.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.219264 kernel: audit: type=1131 audit(1746837828.155:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.287787 systemd[1]: Started kubelet.service. May 10 00:43:48.302273 kernel: audit: type=1130 audit(1746837828.287:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.903147 kubelet[2016]: E0510 00:43:48.903091 2016 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:43:48.904994 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:43:48.905156 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:43:48.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:43:48.924300 kernel: audit: type=1131 audit(1746837828.905:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:43:50.985164 env[1417]: time="2025-05-10T00:43:50.985101950Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:50.993962 env[1417]: time="2025-05-10T00:43:50.993906581Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:51.001161 env[1417]: time="2025-05-10T00:43:51.001096770Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:51.011884 env[1417]: time="2025-05-10T00:43:51.011828244Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:51.012716 env[1417]: time="2025-05-10T00:43:51.012676866Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" May 10 00:43:54.125577 systemd[1]: Stopped kubelet.service. May 10 00:43:54.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.151274 kernel: audit: type=1130 audit(1746837834.125:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.133029 systemd[1]: Starting kubelet.service... May 10 00:43:54.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.175388 kernel: audit: type=1131 audit(1746837834.125:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.214791 systemd[1]: Reloading. May 10 00:43:54.367302 /usr/lib/systemd/system-generators/torcx-generator[2106]: time="2025-05-10T00:43:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:43:54.368768 /usr/lib/systemd/system-generators/torcx-generator[2106]: time="2025-05-10T00:43:54Z" level=info msg="torcx already run" May 10 00:43:54.502734 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:43:54.502759 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:43:54.523113 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:43:54.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.624300 kernel: audit: type=1400 audit(1746837834.608:266): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.640440 kernel: audit: type=1400 audit(1746837834.608:267): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.670471 kernel: audit: type=1400 audit(1746837834.608:268): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.670628 kernel: audit: type=1400 audit(1746837834.608:269): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.687671 kernel: audit: type=1400 audit(1746837834.608:270): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.687770 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:43:54.714233 kernel: audit: type=1400 audit(1746837834.608:271): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.715866 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 10 00:43:54.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.623000 audit: BPF prog-id=44 op=LOAD May 10 00:43:54.623000 audit: BPF prog-id=38 op=UNLOAD May 10 00:43:54.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.639000 audit: BPF prog-id=45 op=LOAD May 10 00:43:54.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.639000 audit: BPF prog-id=46 op=LOAD May 10 00:43:54.640000 audit: BPF prog-id=39 op=UNLOAD May 10 00:43:54.640000 audit: BPF prog-id=40 op=UNLOAD May 10 00:43:54.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.655000 audit: BPF prog-id=47 op=LOAD May 10 00:43:54.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.670000 audit: BPF prog-id=48 op=LOAD May 10 00:43:54.670000 audit: BPF prog-id=27 op=UNLOAD May 10 00:43:54.670000 audit: BPF prog-id=28 op=UNLOAD May 10 00:43:54.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.686000 audit: BPF prog-id=49 op=LOAD May 10 00:43:54.686000 audit: BPF prog-id=29 op=UNLOAD May 10 00:43:54.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.722000 audit: BPF prog-id=50 op=LOAD May 10 00:43:54.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.722000 audit: BPF prog-id=51 op=LOAD May 10 00:43:54.722000 audit: BPF prog-id=30 op=UNLOAD May 10 00:43:54.722000 audit: BPF prog-id=31 op=UNLOAD May 10 00:43:54.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.723000 audit: BPF prog-id=52 op=LOAD May 10 00:43:54.723000 audit: BPF prog-id=37 op=UNLOAD May 10 00:43:54.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.725000 audit: BPF prog-id=53 op=LOAD May 10 00:43:54.725000 audit: BPF prog-id=32 op=UNLOAD May 10 00:43:54.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.726000 audit: BPF prog-id=54 op=LOAD May 10 00:43:54.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.726000 audit: BPF prog-id=55 op=LOAD May 10 00:43:54.726000 audit: BPF prog-id=33 op=UNLOAD May 10 00:43:54.726000 audit: BPF prog-id=34 op=UNLOAD May 10 00:43:54.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.729000 audit: BPF prog-id=56 op=LOAD May 10 00:43:54.729000 audit: BPF prog-id=36 op=UNLOAD May 10 00:43:54.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.731000 audit: BPF prog-id=57 op=LOAD May 10 00:43:54.731000 audit: BPF prog-id=43 op=UNLOAD May 10 00:43:54.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.732000 audit: BPF prog-id=58 op=LOAD May 10 00:43:54.732000 audit: BPF prog-id=41 op=UNLOAD May 10 00:43:54.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.764964 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:43:54.765201 systemd[1]: Stopped kubelet.service. May 10 00:43:54.767531 systemd[1]: Starting kubelet.service... May 10 00:43:54.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.873058 systemd[1]: Started kubelet.service. May 10 00:43:54.936902 kubelet[2175]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:43:54.936902 kubelet[2175]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 00:43:54.936902 kubelet[2175]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:43:54.937478 kubelet[2175]: I0510 00:43:54.936979 2175 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:43:55.546966 kubelet[2175]: I0510 00:43:55.546915 2175 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 10 00:43:55.546966 kubelet[2175]: I0510 00:43:55.546951 2175 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:43:55.548309 kubelet[2175]: I0510 00:43:55.548267 2175 server.go:927] "Client rotation is on, will bootstrap in background" May 10 00:43:55.570944 kubelet[2175]: I0510 00:43:55.570901 2175 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:43:55.572281 kubelet[2175]: E0510 00:43:55.572221 2175 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.8.40:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:55.583506 kubelet[2175]: I0510 00:43:55.583464 2175 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:43:55.585951 kubelet[2175]: I0510 00:43:55.585866 2175 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:43:55.586225 kubelet[2175]: I0510 00:43:55.585945 2175 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-d5b055839e","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 10 00:43:55.587886 kubelet[2175]: I0510 00:43:55.586242 2175 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:43:55.587886 kubelet[2175]: I0510 00:43:55.586286 2175 container_manager_linux.go:301] "Creating device plugin manager" May 10 00:43:55.587886 kubelet[2175]: I0510 00:43:55.586440 2175 state_mem.go:36] "Initialized new in-memory state store" May 10 00:43:55.589515 kubelet[2175]: I0510 00:43:55.589486 2175 kubelet.go:400] "Attempting to sync node with API server" May 10 00:43:55.589654 kubelet[2175]: I0510 00:43:55.589556 2175 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:43:55.589654 kubelet[2175]: I0510 00:43:55.589596 2175 kubelet.go:312] "Adding apiserver pod source" May 10 00:43:55.589654 kubelet[2175]: I0510 00:43:55.589621 2175 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:43:55.598707 kubelet[2175]: W0510 00:43:55.597075 2175 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.8.40:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:55.598707 kubelet[2175]: E0510 00:43:55.597151 2175 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.40:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:55.599584 kubelet[2175]: W0510 00:43:55.599520 2175 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.8.40:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-d5b055839e&limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:55.599760 kubelet[2175]: E0510 00:43:55.599745 2175 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.40:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-d5b055839e&limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:55.599991 kubelet[2175]: I0510 00:43:55.599971 2175 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:43:55.604705 kubelet[2175]: I0510 00:43:55.604656 2175 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:43:55.604885 kubelet[2175]: W0510 00:43:55.604761 2175 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 10 00:43:55.605796 kubelet[2175]: I0510 00:43:55.605573 2175 server.go:1264] "Started kubelet" May 10 00:43:55.615141 kubelet[2175]: I0510 00:43:55.615090 2175 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:43:55.616512 kubelet[2175]: I0510 00:43:55.616470 2175 server.go:455] "Adding debug handlers to kubelet server" May 10 00:43:55.619063 kubelet[2175]: I0510 00:43:55.618981 2175 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:43:55.619597 kubelet[2175]: I0510 00:43:55.619577 2175 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:43:55.621056 kubelet[2175]: E0510 00:43:55.620886 2175 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.8.40:6443/api/v1/namespaces/default/events\": dial tcp 10.200.8.40:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.7-n-d5b055839e.183e03c19f7af657 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-d5b055839e,UID:ci-3510.3.7-n-d5b055839e,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-d5b055839e,},FirstTimestamp:2025-05-10 00:43:55.605538391 +0000 UTC m=+0.726469947,LastTimestamp:2025-05-10 00:43:55.605538391 +0000 UTC m=+0.726469947,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-d5b055839e,}" May 10 00:43:55.622000 audit[2175]: AVC avc: denied { mac_admin } for pid=2175 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.622000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:43:55.622000 audit[2175]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b7f8f0 a1=c000b6f530 a2=c000b7f8c0 a3=25 items=0 ppid=1 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.622000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:43:55.622000 audit[2175]: AVC avc: denied { mac_admin } for pid=2175 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.622000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:43:55.622000 audit[2175]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bd6e60 a1=c000b6f548 a2=c000b7f980 a3=25 items=0 ppid=1 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.622000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:43:55.623504 kubelet[2175]: I0510 00:43:55.622533 2175 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:43:55.623504 kubelet[2175]: I0510 00:43:55.622609 2175 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 00:43:55.623504 kubelet[2175]: I0510 00:43:55.622690 2175 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:43:55.627481 kubelet[2175]: E0510 00:43:55.627425 2175 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:43:55.628000 audit[2185]: NETFILTER_CFG table=mangle:31 family=2 entries=2 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:55.628000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcd5360080 a2=0 a3=7ffcd536006c items=0 ppid=2175 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.628000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:43:55.630000 audit[2186]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:55.630000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1fc96de0 a2=0 a3=7ffc1fc96dcc items=0 ppid=2175 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:43:55.633122 kubelet[2175]: I0510 00:43:55.633081 2175 volume_manager.go:291] "Starting Kubelet Volume Manager" May 10 00:43:55.635401 kubelet[2175]: I0510 00:43:55.635369 2175 reconciler.go:26] "Reconciler: start to sync state" May 10 00:43:55.635000 audit[2188]: NETFILTER_CFG table=filter:33 family=2 entries=2 op=nft_register_chain pid=2188 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:55.635000 audit[2188]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff04e6eb80 a2=0 a3=7fff04e6eb6c items=0 ppid=2175 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.635000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:43:55.636761 kubelet[2175]: E0510 00:43:55.636710 2175 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-d5b055839e?timeout=10s\": dial tcp 10.200.8.40:6443: connect: connection refused" interval="200ms" May 10 00:43:55.639967 kubelet[2175]: I0510 00:43:55.639931 2175 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:43:55.641448 kubelet[2175]: I0510 00:43:55.641407 2175 factory.go:221] Registration of the containerd container factory successfully May 10 00:43:55.641000 audit[2190]: NETFILTER_CFG table=filter:34 family=2 entries=2 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:55.641000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd89b43600 a2=0 a3=7ffd89b435ec items=0 ppid=2175 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.641000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:43:55.641978 kubelet[2175]: I0510 00:43:55.641962 2175 factory.go:221] Registration of the systemd container factory successfully May 10 00:43:55.643086 kubelet[2175]: I0510 00:43:55.643037 2175 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:43:55.654092 kubelet[2175]: W0510 00:43:55.654030 2175 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.8.40:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:55.654557 kubelet[2175]: E0510 00:43:55.654364 2175 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.40:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:55.712000 audit[2196]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:55.712000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe10be5770 a2=0 a3=7ffe10be575c items=0 ppid=2175 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.712000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 10 00:43:55.713571 kubelet[2175]: I0510 00:43:55.713513 2175 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:43:55.715000 audit[2199]: NETFILTER_CFG table=mangle:36 family=10 entries=2 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:55.715000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff076a1540 a2=0 a3=7fff076a152c items=0 ppid=2175 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.715000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:43:55.716625 kubelet[2175]: I0510 00:43:55.716302 2175 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:43:55.716625 kubelet[2175]: I0510 00:43:55.716362 2175 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 00:43:55.716625 kubelet[2175]: I0510 00:43:55.716384 2175 kubelet.go:2337] "Starting kubelet main sync loop" May 10 00:43:55.716625 kubelet[2175]: E0510 00:43:55.716449 2175 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:43:55.716000 audit[2198]: NETFILTER_CFG table=mangle:37 family=2 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:55.716000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9bf01360 a2=0 a3=7fff9bf0134c items=0 ppid=2175 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.716000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:43:55.718467 kubelet[2175]: W0510 00:43:55.718434 2175 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.8.40:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:55.718634 kubelet[2175]: E0510 00:43:55.718618 2175 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.40:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:55.719000 audit[2201]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:55.719000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff07534e20 a2=0 a3=7fff07534e0c items=0 ppid=2175 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.719000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:43:55.719957 kubelet[2175]: I0510 00:43:55.719937 2175 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 00:43:55.720147 kubelet[2175]: I0510 00:43:55.720131 2175 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 00:43:55.720316 kubelet[2175]: I0510 00:43:55.720241 2175 state_mem.go:36] "Initialized new in-memory state store" May 10 00:43:55.721000 audit[2202]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:55.721000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc38c8e10 a2=0 a3=7ffdc38c8dfc items=0 ppid=2175 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.721000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:43:55.722000 audit[2203]: NETFILTER_CFG table=nat:40 family=10 entries=2 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:55.722000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe2ad7a850 a2=0 a3=7ffe2ad7a83c items=0 ppid=2175 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.722000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:43:55.723000 audit[2204]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:55.723000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff31ce0f00 a2=0 a3=7fff31ce0eec items=0 ppid=2175 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.723000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:43:55.724000 audit[2205]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:55.724000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc5d49eae0 a2=0 a3=7ffc5d49eacc items=0 ppid=2175 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.724000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:43:55.736058 kubelet[2175]: I0510 00:43:55.735987 2175 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.7-n-d5b055839e" May 10 00:43:55.736519 kubelet[2175]: E0510 00:43:55.736483 2175 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.40:6443/api/v1/nodes\": dial tcp 10.200.8.40:6443: connect: connection refused" node="ci-3510.3.7-n-d5b055839e" May 10 00:43:55.752084 kubelet[2175]: I0510 00:43:55.752038 2175 policy_none.go:49] "None policy: Start" May 10 00:43:55.753838 kubelet[2175]: I0510 00:43:55.753791 2175 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 00:43:55.753838 kubelet[2175]: I0510 00:43:55.753840 2175 state_mem.go:35] "Initializing new in-memory state store" May 10 00:43:55.836140 kubelet[2175]: E0510 00:43:55.817422 2175 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 10 00:43:55.837908 kubelet[2175]: E0510 00:43:55.837836 2175 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-d5b055839e?timeout=10s\": dial tcp 10.200.8.40:6443: connect: connection refused" interval="400ms" May 10 00:43:55.939011 kubelet[2175]: I0510 00:43:55.938975 2175 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.7-n-d5b055839e" May 10 00:43:55.939486 kubelet[2175]: E0510 00:43:55.939460 2175 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.40:6443/api/v1/nodes\": dial tcp 10.200.8.40:6443: connect: connection refused" node="ci-3510.3.7-n-d5b055839e" May 10 00:43:55.984085 systemd[1]: Created slice kubepods.slice. May 10 00:43:55.990993 systemd[1]: Created slice kubepods-burstable.slice. May 10 00:43:55.994981 systemd[1]: Created slice kubepods-besteffort.slice. May 10 00:43:56.003321 kubelet[2175]: I0510 00:43:56.003279 2175 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:43:56.003000 audit[2175]: AVC avc: denied { mac_admin } for pid=2175 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:56.003000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:43:56.003000 audit[2175]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d1eae0 a1=c000b25d10 a2=c000d1eab0 a3=25 items=0 ppid=1 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:56.003000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:43:56.003793 kubelet[2175]: I0510 00:43:56.003362 2175 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:43:56.003793 kubelet[2175]: I0510 00:43:56.003518 2175 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:43:56.003793 kubelet[2175]: I0510 00:43:56.003668 2175 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:43:56.013162 kubelet[2175]: E0510 00:43:56.013115 2175 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.7-n-d5b055839e\" not found" May 10 00:43:56.018482 kubelet[2175]: I0510 00:43:56.018407 2175 topology_manager.go:215] "Topology Admit Handler" podUID="7f66b917e2cf0d146db85a50c7d839a1" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.7-n-d5b055839e" May 10 00:43:56.020625 kubelet[2175]: I0510 00:43:56.020586 2175 topology_manager.go:215] "Topology Admit Handler" podUID="796ed1f2eb9c4b0d6c0b2f20e3cc4e00" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.7-n-d5b055839e" May 10 00:43:56.345266 kubelet[2175]: I0510 00:43:56.344993 2175 topology_manager.go:215] "Topology Admit Handler" podUID="3440e32e345e8b87b9af382d6df7b4bc" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.7-n-d5b055839e" May 10 00:43:56.348345 kubelet[2175]: E0510 00:43:56.347377 2175 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-d5b055839e?timeout=10s\": dial tcp 10.200.8.40:6443: connect: connection refused" interval="800ms" May 10 00:43:56.351173 kubelet[2175]: I0510 00:43:56.351134 2175 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.7-n-d5b055839e" May 10 00:43:56.352140 kubelet[2175]: E0510 00:43:56.351816 2175 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.40:6443/api/v1/nodes\": dial tcp 10.200.8.40:6443: connect: connection refused" node="ci-3510.3.7-n-d5b055839e" May 10 00:43:56.357923 systemd[1]: Created slice kubepods-burstable-pod796ed1f2eb9c4b0d6c0b2f20e3cc4e00.slice. May 10 00:43:56.384339 systemd[1]: Created slice kubepods-burstable-pod7f66b917e2cf0d146db85a50c7d839a1.slice. May 10 00:43:56.396281 systemd[1]: Created slice kubepods-burstable-pod3440e32e345e8b87b9af382d6df7b4bc.slice. May 10 00:43:56.483703 kubelet[2175]: I0510 00:43:56.483649 2175 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/796ed1f2eb9c4b0d6c0b2f20e3cc4e00-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-d5b055839e\" (UID: \"796ed1f2eb9c4b0d6c0b2f20e3cc4e00\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-d5b055839e" May 10 00:43:56.483997 kubelet[2175]: I0510 00:43:56.483963 2175 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/796ed1f2eb9c4b0d6c0b2f20e3cc4e00-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-d5b055839e\" (UID: \"796ed1f2eb9c4b0d6c0b2f20e3cc4e00\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-d5b055839e" May 10 00:43:56.484093 kubelet[2175]: I0510 00:43:56.483999 2175 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/796ed1f2eb9c4b0d6c0b2f20e3cc4e00-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-d5b055839e\" (UID: \"796ed1f2eb9c4b0d6c0b2f20e3cc4e00\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-d5b055839e" May 10 00:43:56.484093 kubelet[2175]: I0510 00:43:56.484032 2175 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7f66b917e2cf0d146db85a50c7d839a1-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-d5b055839e\" (UID: \"7f66b917e2cf0d146db85a50c7d839a1\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-d5b055839e" May 10 00:43:56.484093 kubelet[2175]: I0510 00:43:56.484055 2175 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/796ed1f2eb9c4b0d6c0b2f20e3cc4e00-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-d5b055839e\" (UID: \"796ed1f2eb9c4b0d6c0b2f20e3cc4e00\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-d5b055839e" May 10 00:43:56.484093 kubelet[2175]: I0510 00:43:56.484081 2175 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/796ed1f2eb9c4b0d6c0b2f20e3cc4e00-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-d5b055839e\" (UID: \"796ed1f2eb9c4b0d6c0b2f20e3cc4e00\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-d5b055839e" May 10 00:43:56.484285 kubelet[2175]: I0510 00:43:56.484105 2175 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3440e32e345e8b87b9af382d6df7b4bc-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-d5b055839e\" (UID: \"3440e32e345e8b87b9af382d6df7b4bc\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-d5b055839e" May 10 00:43:56.484285 kubelet[2175]: I0510 00:43:56.484127 2175 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7f66b917e2cf0d146db85a50c7d839a1-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-d5b055839e\" (UID: \"7f66b917e2cf0d146db85a50c7d839a1\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-d5b055839e" May 10 00:43:56.484285 kubelet[2175]: I0510 00:43:56.484149 2175 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7f66b917e2cf0d146db85a50c7d839a1-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-d5b055839e\" (UID: \"7f66b917e2cf0d146db85a50c7d839a1\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-d5b055839e" May 10 00:43:56.645074 kubelet[2175]: W0510 00:43:56.644923 2175 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.8.40:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-d5b055839e&limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:56.645074 kubelet[2175]: E0510 00:43:56.644995 2175 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.40:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-d5b055839e&limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:56.684113 env[1417]: time="2025-05-10T00:43:56.684060026Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-d5b055839e,Uid:796ed1f2eb9c4b0d6c0b2f20e3cc4e00,Namespace:kube-system,Attempt:0,}" May 10 00:43:56.695433 env[1417]: time="2025-05-10T00:43:56.695381579Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-d5b055839e,Uid:7f66b917e2cf0d146db85a50c7d839a1,Namespace:kube-system,Attempt:0,}" May 10 00:43:56.700328 env[1417]: time="2025-05-10T00:43:56.700278988Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-d5b055839e,Uid:3440e32e345e8b87b9af382d6df7b4bc,Namespace:kube-system,Attempt:0,}" May 10 00:43:56.774088 kubelet[2175]: W0510 00:43:56.774035 2175 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.8.40:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:56.774088 kubelet[2175]: E0510 00:43:56.774095 2175 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.40:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:56.835385 kubelet[2175]: W0510 00:43:56.835327 2175 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.8.40:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:56.835385 kubelet[2175]: E0510 00:43:56.835386 2175 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.40:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:56.887986 kubelet[2175]: W0510 00:43:56.887913 2175 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.8.40:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:56.887986 kubelet[2175]: E0510 00:43:56.887988 2175 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.40:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:57.148188 kubelet[2175]: E0510 00:43:57.148131 2175 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-d5b055839e?timeout=10s\": dial tcp 10.200.8.40:6443: connect: connection refused" interval="1.6s" May 10 00:43:57.154378 kubelet[2175]: I0510 00:43:57.154343 2175 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.7-n-d5b055839e" May 10 00:43:57.154715 kubelet[2175]: E0510 00:43:57.154689 2175 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.40:6443/api/v1/nodes\": dial tcp 10.200.8.40:6443: connect: connection refused" node="ci-3510.3.7-n-d5b055839e" May 10 00:43:57.296334 kubelet[2175]: E0510 00:43:57.296168 2175 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.8.40:6443/api/v1/namespaces/default/events\": dial tcp 10.200.8.40:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.7-n-d5b055839e.183e03c19f7af657 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-d5b055839e,UID:ci-3510.3.7-n-d5b055839e,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-d5b055839e,},FirstTimestamp:2025-05-10 00:43:55.605538391 +0000 UTC m=+0.726469947,LastTimestamp:2025-05-10 00:43:55.605538391 +0000 UTC m=+0.726469947,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-d5b055839e,}" May 10 00:43:57.749486 kubelet[2175]: E0510 00:43:57.749449 2175 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.8.40:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:58.622966 kubelet[2175]: W0510 00:43:58.622918 2175 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.8.40:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:58.622966 kubelet[2175]: E0510 00:43:58.622965 2175 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.40:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:58.749214 kubelet[2175]: E0510 00:43:58.749151 2175 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-d5b055839e?timeout=10s\": dial tcp 10.200.8.40:6443: connect: connection refused" interval="3.2s" May 10 00:43:58.756885 kubelet[2175]: I0510 00:43:58.756852 2175 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.7-n-d5b055839e" May 10 00:43:58.757258 kubelet[2175]: E0510 00:43:58.757217 2175 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.40:6443/api/v1/nodes\": dial tcp 10.200.8.40:6443: connect: connection refused" node="ci-3510.3.7-n-d5b055839e" May 10 00:43:59.185648 kubelet[2175]: W0510 00:43:59.185605 2175 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.8.40:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-d5b055839e&limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:59.185648 kubelet[2175]: E0510 00:43:59.185650 2175 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.40:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-d5b055839e&limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:59.369063 kubelet[2175]: W0510 00:43:59.369011 2175 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.8.40:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:59.369063 kubelet[2175]: E0510 00:43:59.369055 2175 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.40:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:59.676589 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3349927508.mount: Deactivated successfully. May 10 00:43:59.721351 env[1417]: time="2025-05-10T00:43:59.721278208Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:59.730431 env[1417]: time="2025-05-10T00:43:59.730389396Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:59.734621 env[1417]: time="2025-05-10T00:43:59.734577982Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:59.740505 env[1417]: time="2025-05-10T00:43:59.740465604Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:59.753759 env[1417]: time="2025-05-10T00:43:59.753706377Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:59.763174 env[1417]: time="2025-05-10T00:43:59.763118271Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:59.766442 env[1417]: time="2025-05-10T00:43:59.766383439Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:59.772823 env[1417]: time="2025-05-10T00:43:59.772770370Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:59.776439 env[1417]: time="2025-05-10T00:43:59.776394845Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:59.784764 env[1417]: time="2025-05-10T00:43:59.784720317Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:59.788280 env[1417]: time="2025-05-10T00:43:59.788226889Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:59.806465 env[1417]: time="2025-05-10T00:43:59.806410764Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:59.856134 kubelet[2175]: W0510 00:43:59.856087 2175 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.8.40:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:59.856134 kubelet[2175]: E0510 00:43:59.856133 2175 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.40:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.40:6443: connect: connection refused May 10 00:43:59.905459 env[1417]: time="2025-05-10T00:43:59.905194603Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:43:59.905459 env[1417]: time="2025-05-10T00:43:59.905266604Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:43:59.905459 env[1417]: time="2025-05-10T00:43:59.905287505Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:43:59.910778 env[1417]: time="2025-05-10T00:43:59.905500409Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d5a1397bac378d4cd351991b41b5e31646427de91242a217252c3d0d2675ea26 pid=2214 runtime=io.containerd.runc.v2 May 10 00:43:59.932916 env[1417]: time="2025-05-10T00:43:59.931787951Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:43:59.933176 env[1417]: time="2025-05-10T00:43:59.933128579Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:43:59.933347 env[1417]: time="2025-05-10T00:43:59.933317883Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:43:59.933675 env[1417]: time="2025-05-10T00:43:59.933635590Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d5035fcd647e0f955235620db8197196bc824f1e586cb4a52eaad94fd6a20a53 pid=2244 runtime=io.containerd.runc.v2 May 10 00:43:59.933784 systemd[1]: Started cri-containerd-d5a1397bac378d4cd351991b41b5e31646427de91242a217252c3d0d2675ea26.scope. May 10 00:43:59.940405 env[1417]: time="2025-05-10T00:43:59.940317227Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:43:59.940697 env[1417]: time="2025-05-10T00:43:59.940636834Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:43:59.940866 env[1417]: time="2025-05-10T00:43:59.940838138Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:43:59.941306 env[1417]: time="2025-05-10T00:43:59.941240747Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cfc7eaf4c0fa80a97ab02c4ab0cb2c1115b813d54d421a9ed3dfc49947f1f797 pid=2242 runtime=io.containerd.runc.v2 May 10 00:43:59.979392 kernel: kauditd_printk_skb: 217 callbacks suppressed May 10 00:43:59.979638 kernel: audit: type=1400 audit(1746837839.957:455): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.991825 systemd[1]: Started cri-containerd-d5035fcd647e0f955235620db8197196bc824f1e586cb4a52eaad94fd6a20a53.scope. May 10 00:43:59.999539 kernel: audit: type=1400 audit(1746837839.957:456): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.014309 kernel: audit: type=1400 audit(1746837839.957:457): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.026220 systemd[1]: Started cri-containerd-cfc7eaf4c0fa80a97ab02c4ab0cb2c1115b813d54d421a9ed3dfc49947f1f797.scope. May 10 00:44:00.040752 kernel: audit: type=1400 audit(1746837839.957:458): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.067399 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:44:00.067549 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 May 10 00:44:00.067576 kernel: audit: type=1400 audit(1746837839.957:459): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.067601 kernel: audit: backlog limit exceeded May 10 00:43:59.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.091334 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:44:00.091500 kernel: audit: type=1400 audit(1746837839.957:460): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.978000 audit: BPF prog-id=59 op=LOAD May 10 00:43:59.978000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.978000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2214 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:59.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435613133393762616333373864346364333531393931623431623565 May 10 00:43:59.978000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.978000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2214 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:59.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435613133393762616333373864346364333531393931623431623565 May 10 00:43:59.978000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.978000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.978000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.978000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.978000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.978000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.978000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.978000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.978000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.978000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.978000 audit: BPF prog-id=60 op=LOAD May 10 00:43:59.978000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ebd10 items=0 ppid=2214 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:59.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435613133393762616333373864346364333531393931623431623565 May 10 00:43:59.979000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.979000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.979000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.979000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.979000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.979000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.979000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.979000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.979000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.979000 audit: BPF prog-id=61 op=LOAD May 10 00:43:59.979000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ebd58 items=0 ppid=2214 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:59.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435613133393762616333373864346364333531393931623431623565 May 10 00:43:59.979000 audit: BPF prog-id=61 op=UNLOAD May 10 00:43:59.979000 audit: BPF prog-id=60 op=UNLOAD May 10 00:43:59.979000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.979000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.979000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.979000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.979000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.979000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.979000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.979000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.979000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.979000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.979000 audit: BPF prog-id=62 op=LOAD May 10 00:43:59.979000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000354168 items=0 ppid=2214 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:59.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435613133393762616333373864346364333531393931623431623565 May 10 00:44:00.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.077000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.077000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c2330 items=0 ppid=2244 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435303335666364363437653066393535323335363230646238313937 May 10 00:44:00.101000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.101000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.101000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.101000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.101000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.101000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.101000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.101000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.101000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.101000 audit: BPF prog-id=65 op=LOAD May 10 00:44:00.101000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c2378 items=0 ppid=2244 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435303335666364363437653066393535323335363230646238313937 May 10 00:44:00.101000 audit: BPF prog-id=65 op=UNLOAD May 10 00:44:00.101000 audit: BPF prog-id=64 op=UNLOAD May 10 00:44:00.101000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.101000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.101000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.101000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.101000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.101000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.101000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.101000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.101000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.101000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.101000 audit: BPF prog-id=66 op=LOAD May 10 00:44:00.101000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c2788 items=0 ppid=2244 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435303335666364363437653066393535323335363230646238313937 May 10 00:44:00.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.113000 audit: BPF prog-id=67 op=LOAD May 10 00:44:00.114000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2242 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366633765616634633066613830613937616230326334616230636232 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2242 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366633765616634633066613830613937616230326334616230636232 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit: BPF prog-id=68 op=LOAD May 10 00:44:00.114000 audit[2271]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dfa10 items=0 ppid=2242 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366633765616634633066613830613937616230326334616230636232 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit: BPF prog-id=69 op=LOAD May 10 00:44:00.114000 audit[2271]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dfa58 items=0 ppid=2242 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366633765616634633066613830613937616230326334616230636232 May 10 00:44:00.114000 audit: BPF prog-id=69 op=UNLOAD May 10 00:44:00.114000 audit: BPF prog-id=68 op=UNLOAD May 10 00:44:00.114000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.114000 audit: BPF prog-id=70 op=LOAD May 10 00:44:00.114000 audit[2271]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001dfe68 items=0 ppid=2242 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366633765616634633066613830613937616230326334616230636232 May 10 00:44:00.126179 env[1417]: time="2025-05-10T00:44:00.126128997Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-d5b055839e,Uid:7f66b917e2cf0d146db85a50c7d839a1,Namespace:kube-system,Attempt:0,} returns sandbox id \"d5a1397bac378d4cd351991b41b5e31646427de91242a217252c3d0d2675ea26\"" May 10 00:44:00.132295 env[1417]: time="2025-05-10T00:44:00.132231220Z" level=info msg="CreateContainer within sandbox \"d5a1397bac378d4cd351991b41b5e31646427de91242a217252c3d0d2675ea26\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 10 00:44:00.159388 env[1417]: time="2025-05-10T00:44:00.159341765Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-d5b055839e,Uid:796ed1f2eb9c4b0d6c0b2f20e3cc4e00,Namespace:kube-system,Attempt:0,} returns sandbox id \"d5035fcd647e0f955235620db8197196bc824f1e586cb4a52eaad94fd6a20a53\"" May 10 00:44:00.163399 env[1417]: time="2025-05-10T00:44:00.163348345Z" level=info msg="CreateContainer within sandbox \"d5035fcd647e0f955235620db8197196bc824f1e586cb4a52eaad94fd6a20a53\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 10 00:44:00.171122 env[1417]: time="2025-05-10T00:44:00.171072800Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-d5b055839e,Uid:3440e32e345e8b87b9af382d6df7b4bc,Namespace:kube-system,Attempt:0,} returns sandbox id \"cfc7eaf4c0fa80a97ab02c4ab0cb2c1115b813d54d421a9ed3dfc49947f1f797\"" May 10 00:44:00.173906 env[1417]: time="2025-05-10T00:44:00.173861356Z" level=info msg="CreateContainer within sandbox \"cfc7eaf4c0fa80a97ab02c4ab0cb2c1115b813d54d421a9ed3dfc49947f1f797\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 10 00:44:00.225293 env[1417]: time="2025-05-10T00:44:00.223382452Z" level=info msg="CreateContainer within sandbox \"d5a1397bac378d4cd351991b41b5e31646427de91242a217252c3d0d2675ea26\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"03de6da12bfaed3f3df3e87e1fb3136b3210e7a55391398a6af48803e44871c1\"" May 10 00:44:00.229363 env[1417]: time="2025-05-10T00:44:00.229323071Z" level=info msg="StartContainer for \"03de6da12bfaed3f3df3e87e1fb3136b3210e7a55391398a6af48803e44871c1\"" May 10 00:44:00.248700 env[1417]: time="2025-05-10T00:44:00.248638059Z" level=info msg="CreateContainer within sandbox \"d5035fcd647e0f955235620db8197196bc824f1e586cb4a52eaad94fd6a20a53\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"47d9ac0289cbc2b6e981851b622d20d923f65fc85b7a686baffc82c6aad503d7\"" May 10 00:44:00.249351 env[1417]: time="2025-05-10T00:44:00.249308373Z" level=info msg="StartContainer for \"47d9ac0289cbc2b6e981851b622d20d923f65fc85b7a686baffc82c6aad503d7\"" May 10 00:44:00.261893 systemd[1]: Started cri-containerd-03de6da12bfaed3f3df3e87e1fb3136b3210e7a55391398a6af48803e44871c1.scope. May 10 00:44:00.274958 env[1417]: time="2025-05-10T00:44:00.274906087Z" level=info msg="CreateContainer within sandbox \"cfc7eaf4c0fa80a97ab02c4ab0cb2c1115b813d54d421a9ed3dfc49947f1f797\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"a88e0794d4df1ebb1ce452e8c75c546084fe093c217c16658224ec4e2f619b58\"" May 10 00:44:00.275704 env[1417]: time="2025-05-10T00:44:00.275672703Z" level=info msg="StartContainer for \"a88e0794d4df1ebb1ce452e8c75c546084fe093c217c16658224ec4e2f619b58\"" May 10 00:44:00.285427 systemd[1]: Started cri-containerd-47d9ac0289cbc2b6e981851b622d20d923f65fc85b7a686baffc82c6aad503d7.scope. May 10 00:44:00.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.293000 audit: BPF prog-id=71 op=LOAD May 10 00:44:00.295000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.295000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2214 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033646536646131326266616564336633646633653837653166623331 May 10 00:44:00.295000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.295000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2214 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033646536646131326266616564336633646633653837653166623331 May 10 00:44:00.296000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.296000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.296000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.296000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.296000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.296000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.296000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.296000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.296000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.296000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.296000 audit: BPF prog-id=72 op=LOAD May 10 00:44:00.296000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00023ef00 items=0 ppid=2214 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033646536646131326266616564336633646633653837653166623331 May 10 00:44:00.297000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.297000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.297000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.297000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.297000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.297000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.297000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.297000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.297000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.297000 audit: BPF prog-id=73 op=LOAD May 10 00:44:00.297000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00023ef48 items=0 ppid=2214 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033646536646131326266616564336633646633653837653166623331 May 10 00:44:00.298000 audit: BPF prog-id=73 op=UNLOAD May 10 00:44:00.298000 audit: BPF prog-id=72 op=UNLOAD May 10 00:44:00.298000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.298000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.298000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.298000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.298000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.298000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.298000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.298000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.298000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.298000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.298000 audit: BPF prog-id=74 op=LOAD May 10 00:44:00.298000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00023f358 items=0 ppid=2214 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033646536646131326266616564336633646633653837653166623331 May 10 00:44:00.322377 systemd[1]: Started cri-containerd-a88e0794d4df1ebb1ce452e8c75c546084fe093c217c16658224ec4e2f619b58.scope. May 10 00:44:00.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit: BPF prog-id=75 op=LOAD May 10 00:44:00.327000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit[2358]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2244 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437643961633032383963626332623665393831383531623632326432 May 10 00:44:00.327000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit[2358]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2244 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437643961633032383963626332623665393831383531623632326432 May 10 00:44:00.327000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.327000 audit: BPF prog-id=76 op=LOAD May 10 00:44:00.327000 audit[2358]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002b86d0 items=0 ppid=2244 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437643961633032383963626332623665393831383531623632326432 May 10 00:44:00.328000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.328000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.328000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.328000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.328000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.328000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.328000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.328000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.328000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.328000 audit: BPF prog-id=77 op=LOAD May 10 00:44:00.328000 audit[2358]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002b8718 items=0 ppid=2244 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437643961633032383963626332623665393831383531623632326432 May 10 00:44:00.328000 audit: BPF prog-id=77 op=UNLOAD May 10 00:44:00.328000 audit: BPF prog-id=76 op=UNLOAD May 10 00:44:00.328000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.328000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.328000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.328000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.328000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.328000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.328000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.328000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.328000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.328000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.328000 audit: BPF prog-id=78 op=LOAD May 10 00:44:00.328000 audit[2358]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002b8b28 items=0 ppid=2244 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437643961633032383963626332623665393831383531623632326432 May 10 00:44:00.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.354000 audit: BPF prog-id=79 op=LOAD May 10 00:44:00.355000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.355000 audit[2380]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2242 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138386530373934643464663165626231636534353265386337356335 May 10 00:44:00.355000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.355000 audit[2380]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2242 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138386530373934643464663165626231636534353265386337356335 May 10 00:44:00.356000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.356000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.356000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.356000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.356000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.356000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.356000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.356000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.356000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.356000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.356000 audit: BPF prog-id=80 op=LOAD May 10 00:44:00.356000 audit[2380]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003f2d00 items=0 ppid=2242 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138386530373934643464663165626231636534353265386337356335 May 10 00:44:00.357000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.357000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.357000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.357000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.357000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.357000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.357000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.357000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.357000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.357000 audit: BPF prog-id=81 op=LOAD May 10 00:44:00.357000 audit[2380]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003f2d48 items=0 ppid=2242 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138386530373934643464663165626231636534353265386337356335 May 10 00:44:00.357000 audit: BPF prog-id=81 op=UNLOAD May 10 00:44:00.357000 audit: BPF prog-id=80 op=UNLOAD May 10 00:44:00.358000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.358000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.358000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.358000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.358000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.358000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.358000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.358000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.358000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.358000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:00.358000 audit: BPF prog-id=82 op=LOAD May 10 00:44:00.358000 audit[2380]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003f3158 items=0 ppid=2242 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138386530373934643464663165626231636534353265386337356335 May 10 00:44:00.376724 env[1417]: time="2025-05-10T00:44:00.376672133Z" level=info msg="StartContainer for \"03de6da12bfaed3f3df3e87e1fb3136b3210e7a55391398a6af48803e44871c1\" returns successfully" May 10 00:44:00.390961 env[1417]: time="2025-05-10T00:44:00.390900119Z" level=info msg="StartContainer for \"47d9ac0289cbc2b6e981851b622d20d923f65fc85b7a686baffc82c6aad503d7\" returns successfully" May 10 00:44:00.437115 env[1417]: time="2025-05-10T00:44:00.437057847Z" level=info msg="StartContainer for \"a88e0794d4df1ebb1ce452e8c75c546084fe093c217c16658224ec4e2f619b58\" returns successfully" May 10 00:44:01.960234 kubelet[2175]: I0510 00:44:01.960205 2175 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.7-n-d5b055839e" May 10 00:44:02.300000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8313 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:02.300000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00826f950 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:44:02.300000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:44:02.302000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:02.302000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003f916e0 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:44:02.302000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:44:02.303000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:02.303000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00826fa70 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:44:02.303000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:44:02.322000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8315 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:02.322000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c0033c17d0 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:44:02.322000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:44:02.327000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8313 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:02.327000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0001208a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:44:02.327000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:02.328000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:02.328000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000e9b080 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:44:02.328000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:02.363000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8313 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:02.363000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c0042294d0 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:44:02.363000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:44:02.372000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:02.372000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0036559a0 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:44:02.372000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:44:02.460293 kubelet[2175]: E0510 00:44:02.460229 2175 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.7-n-d5b055839e\" not found" node="ci-3510.3.7-n-d5b055839e" May 10 00:44:02.576284 kubelet[2175]: I0510 00:44:02.576115 2175 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.7-n-d5b055839e" May 10 00:44:02.617479 kubelet[2175]: E0510 00:44:02.617432 2175 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-d5b055839e\" not found" May 10 00:44:03.601628 kubelet[2175]: I0510 00:44:03.601584 2175 apiserver.go:52] "Watching apiserver" May 10 00:44:03.640690 kubelet[2175]: I0510 00:44:03.640635 2175 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:44:04.932593 systemd[1]: Reloading. May 10 00:44:05.034872 /usr/lib/systemd/system-generators/torcx-generator[2465]: time="2025-05-10T00:44:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:44:05.034959 /usr/lib/systemd/system-generators/torcx-generator[2465]: time="2025-05-10T00:44:05Z" level=info msg="torcx already run" May 10 00:44:05.160975 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:44:05.161000 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:44:05.178517 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:44:05.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.284333 kernel: kauditd_printk_skb: 380 callbacks suppressed May 10 00:44:05.284566 kernel: audit: type=1400 audit(1746837845.262:567): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.299313 kernel: audit: type=1400 audit(1746837845.262:568): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.315452 kernel: audit: type=1400 audit(1746837845.262:569): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.346124 kernel: audit: type=1400 audit(1746837845.262:570): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.346280 kernel: audit: type=1400 audit(1746837845.262:571): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.375321 kernel: audit: type=1400 audit(1746837845.262:572): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.375497 kernel: audit: type=1400 audit(1746837845.262:573): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.376607 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:44:05.395570 kernel: audit: type=1400 audit(1746837845.262:574): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.395727 kernel: audit: audit_lost=16 audit_rate_limit=0 audit_backlog_limit=64 May 10 00:44:05.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.298000 audit: BPF prog-id=83 op=LOAD May 10 00:44:05.298000 audit: BPF prog-id=71 op=UNLOAD May 10 00:44:05.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.314000 audit: BPF prog-id=84 op=LOAD May 10 00:44:05.314000 audit: BPF prog-id=44 op=UNLOAD May 10 00:44:05.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.315000 audit: BPF prog-id=85 op=LOAD May 10 00:44:05.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.315000 audit: BPF prog-id=86 op=LOAD May 10 00:44:05.315000 audit: BPF prog-id=45 op=UNLOAD May 10 00:44:05.315000 audit: BPF prog-id=46 op=UNLOAD May 10 00:44:05.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.360000 audit: BPF prog-id=87 op=LOAD May 10 00:44:05.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.374000 audit: BPF prog-id=88 op=LOAD May 10 00:44:05.374000 audit: BPF prog-id=47 op=UNLOAD May 10 00:44:05.374000 audit: BPF prog-id=48 op=UNLOAD May 10 00:44:05.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.399000 audit: BPF prog-id=89 op=LOAD May 10 00:44:05.399000 audit: BPF prog-id=49 op=UNLOAD May 10 00:44:05.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.399000 audit: BPF prog-id=90 op=LOAD May 10 00:44:05.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.400000 audit: BPF prog-id=91 op=LOAD May 10 00:44:05.400000 audit: BPF prog-id=50 op=UNLOAD May 10 00:44:05.400000 audit: BPF prog-id=51 op=UNLOAD May 10 00:44:05.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.401000 audit: BPF prog-id=92 op=LOAD May 10 00:44:05.401000 audit: BPF prog-id=52 op=UNLOAD May 10 00:44:05.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit: BPF prog-id=93 op=LOAD May 10 00:44:05.403000 audit: BPF prog-id=53 op=UNLOAD May 10 00:44:05.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit: BPF prog-id=94 op=LOAD May 10 00:44:05.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.403000 audit: BPF prog-id=95 op=LOAD May 10 00:44:05.403000 audit: BPF prog-id=54 op=UNLOAD May 10 00:44:05.403000 audit: BPF prog-id=55 op=UNLOAD May 10 00:44:05.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.406000 audit: BPF prog-id=96 op=LOAD May 10 00:44:05.406000 audit: BPF prog-id=63 op=UNLOAD May 10 00:44:05.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.407000 audit: BPF prog-id=97 op=LOAD May 10 00:44:05.407000 audit: BPF prog-id=59 op=UNLOAD May 10 00:44:05.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.408000 audit: BPF prog-id=98 op=LOAD May 10 00:44:05.408000 audit: BPF prog-id=75 op=UNLOAD May 10 00:44:05.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.409000 audit: BPF prog-id=99 op=LOAD May 10 00:44:05.409000 audit: BPF prog-id=56 op=UNLOAD May 10 00:44:05.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.412000 audit: BPF prog-id=100 op=LOAD May 10 00:44:05.412000 audit: BPF prog-id=79 op=UNLOAD May 10 00:44:05.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.413000 audit: BPF prog-id=101 op=LOAD May 10 00:44:05.413000 audit: BPF prog-id=57 op=UNLOAD May 10 00:44:05.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.414000 audit: BPF prog-id=102 op=LOAD May 10 00:44:05.414000 audit: BPF prog-id=58 op=UNLOAD May 10 00:44:05.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.415000 audit: BPF prog-id=103 op=LOAD May 10 00:44:05.415000 audit: BPF prog-id=67 op=UNLOAD May 10 00:44:05.435927 systemd[1]: Stopping kubelet.service... May 10 00:44:05.439851 kubelet[2175]: E0510 00:44:05.436196 2175 event.go:319] "Unable to write event (broadcaster is shut down)" event="&Event{ObjectMeta:{ci-3510.3.7-n-d5b055839e.183e03c19f7af657 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-d5b055839e,UID:ci-3510.3.7-n-d5b055839e,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-d5b055839e,},FirstTimestamp:2025-05-10 00:43:55.605538391 +0000 UTC m=+0.726469947,LastTimestamp:2025-05-10 00:43:55.605538391 +0000 UTC m=+0.726469947,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-d5b055839e,}" May 10 00:44:05.458674 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:44:05.458910 systemd[1]: Stopped kubelet.service. May 10 00:44:05.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:05.459002 systemd[1]: kubelet.service: Consumed 1.182s CPU time. May 10 00:44:05.461325 systemd[1]: Starting kubelet.service... May 10 00:44:05.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:05.558166 systemd[1]: Started kubelet.service. May 10 00:44:05.606370 kubelet[2528]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:44:05.606370 kubelet[2528]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 00:44:05.606370 kubelet[2528]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:44:05.606896 kubelet[2528]: I0510 00:44:05.606430 2528 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:44:05.611453 kubelet[2528]: I0510 00:44:05.611417 2528 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 10 00:44:05.611453 kubelet[2528]: I0510 00:44:05.611441 2528 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:44:05.611711 kubelet[2528]: I0510 00:44:05.611692 2528 server.go:927] "Client rotation is on, will bootstrap in background" May 10 00:44:05.612915 kubelet[2528]: I0510 00:44:05.612887 2528 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 10 00:44:05.616636 kubelet[2528]: I0510 00:44:05.616606 2528 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:44:05.625079 kubelet[2528]: I0510 00:44:05.625045 2528 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:44:05.625396 kubelet[2528]: I0510 00:44:05.625360 2528 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:44:05.625601 kubelet[2528]: I0510 00:44:05.625396 2528 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-d5b055839e","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 10 00:44:05.625749 kubelet[2528]: I0510 00:44:05.625617 2528 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:44:05.625749 kubelet[2528]: I0510 00:44:05.625632 2528 container_manager_linux.go:301] "Creating device plugin manager" May 10 00:44:05.625749 kubelet[2528]: I0510 00:44:05.625691 2528 state_mem.go:36] "Initialized new in-memory state store" May 10 00:44:05.625878 kubelet[2528]: I0510 00:44:05.625812 2528 kubelet.go:400] "Attempting to sync node with API server" May 10 00:44:05.625878 kubelet[2528]: I0510 00:44:05.625831 2528 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:44:05.625878 kubelet[2528]: I0510 00:44:05.625859 2528 kubelet.go:312] "Adding apiserver pod source" May 10 00:44:05.625984 kubelet[2528]: I0510 00:44:05.625882 2528 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:44:05.629041 kubelet[2528]: I0510 00:44:05.629014 2528 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:44:05.629241 kubelet[2528]: I0510 00:44:05.629224 2528 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:44:05.629742 kubelet[2528]: I0510 00:44:05.629721 2528 server.go:1264] "Started kubelet" May 10 00:44:05.631000 audit[2528]: AVC avc: denied { mac_admin } for pid=2528 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.631000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:44:05.631000 audit[2528]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00039ff80 a1=c0007fd650 a2=c00039fec0 a3=25 items=0 ppid=1 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:05.631000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:44:05.631000 audit[2528]: AVC avc: denied { mac_admin } for pid=2528 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.631000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:44:05.631000 audit[2528]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000969f60 a1=c0007fd668 a2=c00011eed0 a3=25 items=0 ppid=1 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:05.631000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:44:05.634291 kubelet[2528]: I0510 00:44:05.632588 2528 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:44:05.634291 kubelet[2528]: I0510 00:44:05.632637 2528 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 00:44:05.634291 kubelet[2528]: I0510 00:44:05.632685 2528 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:44:05.640196 kubelet[2528]: I0510 00:44:05.640138 2528 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:44:05.643707 kubelet[2528]: I0510 00:44:05.641536 2528 server.go:455] "Adding debug handlers to kubelet server" May 10 00:44:05.643707 kubelet[2528]: I0510 00:44:05.642762 2528 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:44:05.643707 kubelet[2528]: I0510 00:44:05.643021 2528 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:44:05.646118 kubelet[2528]: I0510 00:44:05.645576 2528 volume_manager.go:291] "Starting Kubelet Volume Manager" May 10 00:44:05.648141 kubelet[2528]: I0510 00:44:05.648081 2528 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:44:05.648305 kubelet[2528]: I0510 00:44:05.648283 2528 reconciler.go:26] "Reconciler: start to sync state" May 10 00:44:05.652474 kubelet[2528]: I0510 00:44:05.650985 2528 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:44:05.652760 kubelet[2528]: I0510 00:44:05.652532 2528 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:44:05.652760 kubelet[2528]: I0510 00:44:05.652565 2528 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 00:44:05.652760 kubelet[2528]: I0510 00:44:05.652599 2528 kubelet.go:2337] "Starting kubelet main sync loop" May 10 00:44:05.652760 kubelet[2528]: E0510 00:44:05.652646 2528 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:44:05.673960 kubelet[2528]: I0510 00:44:05.673920 2528 factory.go:221] Registration of the systemd container factory successfully May 10 00:44:05.674156 kubelet[2528]: I0510 00:44:05.674054 2528 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:44:05.677371 kubelet[2528]: E0510 00:44:05.677117 2528 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:44:05.677964 kubelet[2528]: I0510 00:44:05.677932 2528 factory.go:221] Registration of the containerd container factory successfully May 10 00:44:05.735143 kubelet[2528]: I0510 00:44:05.735107 2528 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 00:44:05.735143 kubelet[2528]: I0510 00:44:05.735126 2528 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 00:44:05.735143 kubelet[2528]: I0510 00:44:05.735152 2528 state_mem.go:36] "Initialized new in-memory state store" May 10 00:44:05.735433 kubelet[2528]: I0510 00:44:05.735380 2528 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 10 00:44:05.735433 kubelet[2528]: I0510 00:44:05.735394 2528 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 10 00:44:05.735433 kubelet[2528]: I0510 00:44:05.735421 2528 policy_none.go:49] "None policy: Start" May 10 00:44:05.736186 kubelet[2528]: I0510 00:44:05.736163 2528 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 00:44:05.736186 kubelet[2528]: I0510 00:44:05.736189 2528 state_mem.go:35] "Initializing new in-memory state store" May 10 00:44:05.736531 kubelet[2528]: I0510 00:44:05.736496 2528 state_mem.go:75] "Updated machine memory state" May 10 00:44:05.740654 kubelet[2528]: I0510 00:44:05.740632 2528 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:44:05.739000 audit[2528]: AVC avc: denied { mac_admin } for pid=2528 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:05.739000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:44:05.739000 audit[2528]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00099b230 a1=c000b67608 a2=c00099b200 a3=25 items=0 ppid=1 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:05.739000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:44:05.742832 kubelet[2528]: I0510 00:44:05.742809 2528 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:44:05.743155 kubelet[2528]: I0510 00:44:05.743113 2528 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:44:05.743367 kubelet[2528]: I0510 00:44:05.743355 2528 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:44:05.749942 kubelet[2528]: I0510 00:44:05.749825 2528 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.7-n-d5b055839e" May 10 00:44:05.752961 kubelet[2528]: I0510 00:44:05.752914 2528 topology_manager.go:215] "Topology Admit Handler" podUID="7f66b917e2cf0d146db85a50c7d839a1" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.7-n-d5b055839e" May 10 00:44:05.753189 kubelet[2528]: I0510 00:44:05.753168 2528 topology_manager.go:215] "Topology Admit Handler" podUID="796ed1f2eb9c4b0d6c0b2f20e3cc4e00" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.7-n-d5b055839e" May 10 00:44:05.753345 kubelet[2528]: I0510 00:44:05.753316 2528 topology_manager.go:215] "Topology Admit Handler" podUID="3440e32e345e8b87b9af382d6df7b4bc" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.7-n-d5b055839e" May 10 00:44:06.107916 kubelet[2528]: I0510 00:44:06.107856 2528 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510.3.7-n-d5b055839e" May 10 00:44:06.108115 kubelet[2528]: I0510 00:44:06.107981 2528 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.7-n-d5b055839e" May 10 00:44:06.121530 kubelet[2528]: W0510 00:44:06.121485 2528 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 00:44:06.122487 kubelet[2528]: W0510 00:44:06.122459 2528 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 00:44:06.123013 kubelet[2528]: W0510 00:44:06.122994 2528 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 00:44:06.197665 kubelet[2528]: I0510 00:44:06.197615 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/796ed1f2eb9c4b0d6c0b2f20e3cc4e00-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-d5b055839e\" (UID: \"796ed1f2eb9c4b0d6c0b2f20e3cc4e00\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-d5b055839e" May 10 00:44:06.197665 kubelet[2528]: I0510 00:44:06.197675 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/796ed1f2eb9c4b0d6c0b2f20e3cc4e00-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-d5b055839e\" (UID: \"796ed1f2eb9c4b0d6c0b2f20e3cc4e00\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-d5b055839e" May 10 00:44:06.197954 kubelet[2528]: I0510 00:44:06.197701 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/796ed1f2eb9c4b0d6c0b2f20e3cc4e00-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-d5b055839e\" (UID: \"796ed1f2eb9c4b0d6c0b2f20e3cc4e00\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-d5b055839e" May 10 00:44:06.197954 kubelet[2528]: I0510 00:44:06.197733 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/796ed1f2eb9c4b0d6c0b2f20e3cc4e00-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-d5b055839e\" (UID: \"796ed1f2eb9c4b0d6c0b2f20e3cc4e00\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-d5b055839e" May 10 00:44:06.197954 kubelet[2528]: I0510 00:44:06.197753 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/796ed1f2eb9c4b0d6c0b2f20e3cc4e00-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-d5b055839e\" (UID: \"796ed1f2eb9c4b0d6c0b2f20e3cc4e00\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-d5b055839e" May 10 00:44:06.197954 kubelet[2528]: I0510 00:44:06.197774 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3440e32e345e8b87b9af382d6df7b4bc-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-d5b055839e\" (UID: \"3440e32e345e8b87b9af382d6df7b4bc\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-d5b055839e" May 10 00:44:06.197954 kubelet[2528]: I0510 00:44:06.197795 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7f66b917e2cf0d146db85a50c7d839a1-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-d5b055839e\" (UID: \"7f66b917e2cf0d146db85a50c7d839a1\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-d5b055839e" May 10 00:44:06.198112 kubelet[2528]: I0510 00:44:06.197814 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7f66b917e2cf0d146db85a50c7d839a1-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-d5b055839e\" (UID: \"7f66b917e2cf0d146db85a50c7d839a1\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-d5b055839e" May 10 00:44:06.198112 kubelet[2528]: I0510 00:44:06.197842 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7f66b917e2cf0d146db85a50c7d839a1-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-d5b055839e\" (UID: \"7f66b917e2cf0d146db85a50c7d839a1\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-d5b055839e" May 10 00:44:06.638679 kubelet[2528]: I0510 00:44:06.638639 2528 apiserver.go:52] "Watching apiserver" May 10 00:44:06.650256 kubelet[2528]: I0510 00:44:06.650202 2528 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:44:06.754490 kubelet[2528]: I0510 00:44:06.754360 2528 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.7-n-d5b055839e" podStartSLOduration=0.75433522 podStartE2EDuration="754.33522ms" podCreationTimestamp="2025-05-10 00:44:06 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:44:06.743528134 +0000 UTC m=+1.177454680" watchObservedRunningTime="2025-05-10 00:44:06.75433522 +0000 UTC m=+1.188261766" May 10 00:44:06.790088 kubelet[2528]: I0510 00:44:06.790011 2528 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.7-n-d5b055839e" podStartSLOduration=0.789983534 podStartE2EDuration="789.983534ms" podCreationTimestamp="2025-05-10 00:44:06 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:44:06.762705764 +0000 UTC m=+1.196632410" watchObservedRunningTime="2025-05-10 00:44:06.789983534 +0000 UTC m=+1.223910180" May 10 00:44:06.835330 kubelet[2528]: I0510 00:44:06.835202 2528 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-d5b055839e" podStartSLOduration=0.835169913 podStartE2EDuration="835.169913ms" podCreationTimestamp="2025-05-10 00:44:06 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:44:06.798288578 +0000 UTC m=+1.232215124" watchObservedRunningTime="2025-05-10 00:44:06.835169913 +0000 UTC m=+1.269096559" May 10 00:44:07.100000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:07.100000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00100ff20 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:44:07.100000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:07.101000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:07.101000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00100ff40 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:44:07.101000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:07.103000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:07.103000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0004b2ba0 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:44:07.103000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:07.107000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:07.107000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f89ba0 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:44:07.107000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:11.486550 sudo[1836]: pam_unix(sudo:session): session closed for user root May 10 00:44:11.485000 audit[1836]: USER_END pid=1836 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:11.490968 kernel: kauditd_printk_skb: 262 callbacks suppressed May 10 00:44:11.491096 kernel: audit: type=1106 audit(1746837851.485:819): pid=1836 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:11.488000 audit[1836]: CRED_DISP pid=1836 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:11.521675 kernel: audit: type=1104 audit(1746837851.488:820): pid=1836 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:11.591937 sshd[1833]: pam_unix(sshd:session): session closed for user core May 10 00:44:11.592000 audit[1833]: USER_END pid=1833 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:44:11.596138 systemd[1]: sshd@6-10.200.8.40:22-10.200.16.10:60670.service: Deactivated successfully. May 10 00:44:11.597099 systemd[1]: session-9.scope: Deactivated successfully. May 10 00:44:11.597288 systemd[1]: session-9.scope: Consumed 4.658s CPU time. May 10 00:44:11.599040 systemd-logind[1398]: Session 9 logged out. Waiting for processes to exit. May 10 00:44:11.600379 systemd-logind[1398]: Removed session 9. May 10 00:44:11.592000 audit[1833]: CRED_DISP pid=1833 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:44:11.655861 kernel: audit: type=1106 audit(1746837851.592:821): pid=1833 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:44:11.656023 kernel: audit: type=1104 audit(1746837851.592:822): pid=1833 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:44:11.656054 kernel: audit: type=1131 audit(1746837851.595:823): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.40:22-10.200.16.10:60670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:11.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.40:22-10.200.16.10:60670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:17.898000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 10 00:44:17.919423 kernel: audit: type=1400 audit(1746837857.898:824): avc: denied { watch } for pid=2387 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 10 00:44:17.898000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e342c0 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:44:17.946280 kernel: audit: type=1300 audit(1746837857.898:824): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e342c0 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:44:17.898000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:17.975297 kernel: audit: type=1327 audit(1746837857.898:824): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:18.124466 kubelet[2528]: I0510 00:44:18.124424 2528 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 10 00:44:18.125209 env[1417]: time="2025-05-10T00:44:18.125157623Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 10 00:44:18.125811 kubelet[2528]: I0510 00:44:18.125685 2528 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 10 00:44:18.829625 kubelet[2528]: I0510 00:44:18.829556 2528 topology_manager.go:215] "Topology Admit Handler" podUID="5071ad50-d273-438b-ac41-7ff7241ddb0a" podNamespace="kube-system" podName="kube-proxy-7spbg" May 10 00:44:18.836511 systemd[1]: Created slice kubepods-besteffort-pod5071ad50_d273_438b_ac41_7ff7241ddb0a.slice. May 10 00:44:18.890679 kubelet[2528]: I0510 00:44:18.890630 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/5071ad50-d273-438b-ac41-7ff7241ddb0a-kube-proxy\") pod \"kube-proxy-7spbg\" (UID: \"5071ad50-d273-438b-ac41-7ff7241ddb0a\") " pod="kube-system/kube-proxy-7spbg" May 10 00:44:18.890900 kubelet[2528]: I0510 00:44:18.890708 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5071ad50-d273-438b-ac41-7ff7241ddb0a-xtables-lock\") pod \"kube-proxy-7spbg\" (UID: \"5071ad50-d273-438b-ac41-7ff7241ddb0a\") " pod="kube-system/kube-proxy-7spbg" May 10 00:44:18.890900 kubelet[2528]: I0510 00:44:18.890733 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5071ad50-d273-438b-ac41-7ff7241ddb0a-lib-modules\") pod \"kube-proxy-7spbg\" (UID: \"5071ad50-d273-438b-ac41-7ff7241ddb0a\") " pod="kube-system/kube-proxy-7spbg" May 10 00:44:18.890900 kubelet[2528]: I0510 00:44:18.890814 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pt7gm\" (UniqueName: \"kubernetes.io/projected/5071ad50-d273-438b-ac41-7ff7241ddb0a-kube-api-access-pt7gm\") pod \"kube-proxy-7spbg\" (UID: \"5071ad50-d273-438b-ac41-7ff7241ddb0a\") " pod="kube-system/kube-proxy-7spbg" May 10 00:44:19.104876 kubelet[2528]: I0510 00:44:19.104683 2528 topology_manager.go:215] "Topology Admit Handler" podUID="ea13e223-bc65-49fd-8992-ec75f236712e" podNamespace="tigera-operator" podName="tigera-operator-797db67f8-kdb4h" May 10 00:44:19.114391 systemd[1]: Created slice kubepods-besteffort-podea13e223_bc65_49fd_8992_ec75f236712e.slice. May 10 00:44:19.154430 env[1417]: time="2025-05-10T00:44:19.154376351Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7spbg,Uid:5071ad50-d273-438b-ac41-7ff7241ddb0a,Namespace:kube-system,Attempt:0,}" May 10 00:44:19.194398 kubelet[2528]: I0510 00:44:19.194346 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ea13e223-bc65-49fd-8992-ec75f236712e-var-lib-calico\") pod \"tigera-operator-797db67f8-kdb4h\" (UID: \"ea13e223-bc65-49fd-8992-ec75f236712e\") " pod="tigera-operator/tigera-operator-797db67f8-kdb4h" May 10 00:44:19.194398 kubelet[2528]: I0510 00:44:19.194395 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-db679\" (UniqueName: \"kubernetes.io/projected/ea13e223-bc65-49fd-8992-ec75f236712e-kube-api-access-db679\") pod \"tigera-operator-797db67f8-kdb4h\" (UID: \"ea13e223-bc65-49fd-8992-ec75f236712e\") " pod="tigera-operator/tigera-operator-797db67f8-kdb4h" May 10 00:44:19.234479 env[1417]: time="2025-05-10T00:44:19.234388959Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:19.234479 env[1417]: time="2025-05-10T00:44:19.234428460Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:19.234740 env[1417]: time="2025-05-10T00:44:19.234461760Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:19.235092 env[1417]: time="2025-05-10T00:44:19.235038267Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4a49b99b2ed0e1cf0ccf93648175e715de719599f57df2ce32535ab1978082ce pid=2610 runtime=io.containerd.runc.v2 May 10 00:44:19.262672 systemd[1]: Started cri-containerd-4a49b99b2ed0e1cf0ccf93648175e715de719599f57df2ce32535ab1978082ce.scope. May 10 00:44:19.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.316588 kernel: audit: type=1400 audit(1746837859.277:825): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.316783 kernel: audit: type=1400 audit(1746837859.277:826): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.339677 kernel: audit: type=1400 audit(1746837859.277:827): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.366289 kernel: audit: type=1400 audit(1746837859.277:828): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.399305 kernel: audit: type=1400 audit(1746837859.277:829): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.425279 kernel: audit: type=1400 audit(1746837859.277:830): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.451117 env[1417]: time="2025-05-10T00:44:19.445800424Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-kdb4h,Uid:ea13e223-bc65-49fd-8992-ec75f236712e,Namespace:tigera-operator,Attempt:0,}" May 10 00:44:19.452574 env[1417]: time="2025-05-10T00:44:19.452525808Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7spbg,Uid:5071ad50-d273-438b-ac41-7ff7241ddb0a,Namespace:kube-system,Attempt:0,} returns sandbox id \"4a49b99b2ed0e1cf0ccf93648175e715de719599f57df2ce32535ab1978082ce\"" May 10 00:44:19.468699 env[1417]: time="2025-05-10T00:44:19.468639011Z" level=info msg="CreateContainer within sandbox \"4a49b99b2ed0e1cf0ccf93648175e715de719599f57df2ce32535ab1978082ce\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 10 00:44:19.478484 kernel: audit: type=1400 audit(1746837859.277:831): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.292000 audit: BPF prog-id=104 op=LOAD May 10 00:44:19.299000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.299000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2610 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461343962393962326564306531636630636366393336343831373565 May 10 00:44:19.299000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.299000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2610 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461343962393962326564306531636630636366393336343831373565 May 10 00:44:19.299000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.299000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.299000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.299000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.299000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.299000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.299000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.299000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.299000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.299000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.299000 audit: BPF prog-id=105 op=LOAD May 10 00:44:19.299000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d00a0 items=0 ppid=2610 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461343962393962326564306531636630636366393336343831373565 May 10 00:44:19.315000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.315000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.315000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.315000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.315000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.315000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.315000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.315000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.315000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.315000 audit: BPF prog-id=106 op=LOAD May 10 00:44:19.315000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d00e8 items=0 ppid=2610 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461343962393962326564306531636630636366393336343831373565 May 10 00:44:19.315000 audit: BPF prog-id=106 op=UNLOAD May 10 00:44:19.315000 audit: BPF prog-id=105 op=UNLOAD May 10 00:44:19.315000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.315000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.315000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.315000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.315000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.315000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.315000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.315000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.315000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.315000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.315000 audit: BPF prog-id=107 op=LOAD May 10 00:44:19.315000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d04f8 items=0 ppid=2610 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461343962393962326564306531636630636366393336343831373565 May 10 00:44:19.560442 env[1417]: time="2025-05-10T00:44:19.560383268Z" level=info msg="CreateContainer within sandbox \"4a49b99b2ed0e1cf0ccf93648175e715de719599f57df2ce32535ab1978082ce\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"b3b1442d513c76930b7360fac4dda4ae64f5f52afb285b253e599f1ef16a3609\"" May 10 00:44:19.561882 env[1417]: time="2025-05-10T00:44:19.561841986Z" level=info msg="StartContainer for \"b3b1442d513c76930b7360fac4dda4ae64f5f52afb285b253e599f1ef16a3609\"" May 10 00:44:19.573939 env[1417]: time="2025-05-10T00:44:19.573437032Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:19.573939 env[1417]: time="2025-05-10T00:44:19.573486333Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:19.573939 env[1417]: time="2025-05-10T00:44:19.573501633Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:19.573939 env[1417]: time="2025-05-10T00:44:19.573642935Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d8fcfdba9a02e00e994bea6768aaba783213f563c94db4bf89b2ee22ec0ca264 pid=2655 runtime=io.containerd.runc.v2 May 10 00:44:19.596307 systemd[1]: Started cri-containerd-b3b1442d513c76930b7360fac4dda4ae64f5f52afb285b253e599f1ef16a3609.scope. May 10 00:44:19.636702 systemd[1]: Started cri-containerd-d8fcfdba9a02e00e994bea6768aaba783213f563c94db4bf89b2ee22ec0ca264.scope. May 10 00:44:19.640000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.640000 audit[2666]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fd030732018 items=0 ppid=2610 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233623134343264353133633736393330623733363066616334646461 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit: BPF prog-id=108 op=LOAD May 10 00:44:19.643000 audit[2666]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000388208 items=0 ppid=2610 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233623134343264353133633736393330623733363066616334646461 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit: BPF prog-id=109 op=LOAD May 10 00:44:19.643000 audit[2666]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000388258 items=0 ppid=2610 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233623134343264353133633736393330623733363066616334646461 May 10 00:44:19.643000 audit: BPF prog-id=109 op=UNLOAD May 10 00:44:19.643000 audit: BPF prog-id=108 op=UNLOAD May 10 00:44:19.643000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.643000 audit: BPF prog-id=110 op=LOAD May 10 00:44:19.643000 audit[2666]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0003882e8 items=0 ppid=2610 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233623134343264353133633736393330623733363066616334646461 May 10 00:44:19.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.656000 audit: BPF prog-id=111 op=LOAD May 10 00:44:19.658000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.658000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2655 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438666366646261396130326530306539393462656136373638616162 May 10 00:44:19.659000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.659000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2655 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438666366646261396130326530306539393462656136373638616162 May 10 00:44:19.659000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.659000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.659000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.659000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.659000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.659000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.659000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.659000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.659000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.659000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.659000 audit: BPF prog-id=112 op=LOAD May 10 00:44:19.659000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d8e10 items=0 ppid=2655 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438666366646261396130326530306539393462656136373638616162 May 10 00:44:19.660000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.660000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.660000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.660000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.660000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.660000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.660000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.660000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.660000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.660000 audit: BPF prog-id=113 op=LOAD May 10 00:44:19.660000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d8e58 items=0 ppid=2655 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438666366646261396130326530306539393462656136373638616162 May 10 00:44:19.660000 audit: BPF prog-id=113 op=UNLOAD May 10 00:44:19.660000 audit: BPF prog-id=112 op=UNLOAD May 10 00:44:19.660000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.660000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.660000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.660000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.660000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.660000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.660000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.660000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.660000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.660000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:19.660000 audit: BPF prog-id=114 op=LOAD May 10 00:44:19.660000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d9268 items=0 ppid=2655 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438666366646261396130326530306539393462656136373638616162 May 10 00:44:19.702554 env[1417]: time="2025-05-10T00:44:19.702483359Z" level=info msg="StartContainer for \"b3b1442d513c76930b7360fac4dda4ae64f5f52afb285b253e599f1ef16a3609\" returns successfully" May 10 00:44:19.723286 env[1417]: time="2025-05-10T00:44:19.723147119Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-kdb4h,Uid:ea13e223-bc65-49fd-8992-ec75f236712e,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"d8fcfdba9a02e00e994bea6768aaba783213f563c94db4bf89b2ee22ec0ca264\"" May 10 00:44:19.729771 env[1417]: time="2025-05-10T00:44:19.728383185Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 10 00:44:19.773289 kubelet[2528]: I0510 00:44:19.773021 2528 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-7spbg" podStartSLOduration=1.772996147 podStartE2EDuration="1.772996147s" podCreationTimestamp="2025-05-10 00:44:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:44:19.772871746 +0000 UTC m=+14.206798392" watchObservedRunningTime="2025-05-10 00:44:19.772996147 +0000 UTC m=+14.206922693" May 10 00:44:19.830000 audit[2747]: NETFILTER_CFG table=mangle:43 family=2 entries=1 op=nft_register_chain pid=2747 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:19.830000 audit[2747]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff397878e0 a2=0 a3=7fff397878cc items=0 ppid=2685 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.830000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:44:19.833000 audit[2748]: NETFILTER_CFG table=mangle:44 family=10 entries=1 op=nft_register_chain pid=2748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:19.833000 audit[2748]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd286ea7f0 a2=0 a3=7ffd286ea7dc items=0 ppid=2685 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.833000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:44:19.837000 audit[2750]: NETFILTER_CFG table=nat:45 family=2 entries=1 op=nft_register_chain pid=2750 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:19.837000 audit[2750]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc41d07d10 a2=0 a3=7ffc41d07cfc items=0 ppid=2685 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.837000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:44:19.839000 audit[2752]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=2752 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:19.839000 audit[2752]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe407dec30 a2=0 a3=7ffe407dec1c items=0 ppid=2685 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.839000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:44:19.840000 audit[2751]: NETFILTER_CFG table=nat:47 family=10 entries=1 op=nft_register_chain pid=2751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:19.840000 audit[2751]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcdcdd3ea0 a2=0 a3=7ffcdcdd3e8c items=0 ppid=2685 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.840000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:44:19.842000 audit[2753]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=2753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:19.842000 audit[2753]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdba05ea50 a2=0 a3=7ffdba05ea3c items=0 ppid=2685 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.842000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:44:19.928000 audit[2754]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2754 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:19.928000 audit[2754]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd64251f00 a2=0 a3=7ffd64251eec items=0 ppid=2685 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.928000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:44:19.934000 audit[2756]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2756 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:19.934000 audit[2756]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff2be11ef0 a2=0 a3=7fff2be11edc items=0 ppid=2685 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.934000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 10 00:44:19.939000 audit[2759]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2759 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:19.939000 audit[2759]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd419c5fe0 a2=0 a3=7ffd419c5fcc items=0 ppid=2685 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.939000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 10 00:44:19.940000 audit[2760]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2760 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:19.940000 audit[2760]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1c282fc0 a2=0 a3=7ffc1c282fac items=0 ppid=2685 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.940000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:44:19.943000 audit[2762]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2762 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:19.943000 audit[2762]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffff370fb20 a2=0 a3=7ffff370fb0c items=0 ppid=2685 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.943000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:44:19.945000 audit[2763]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2763 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:19.945000 audit[2763]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd39b1f740 a2=0 a3=7ffd39b1f72c items=0 ppid=2685 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.945000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:44:19.949000 audit[2765]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2765 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:19.949000 audit[2765]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffebb669e10 a2=0 a3=7ffebb669dfc items=0 ppid=2685 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.949000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:44:19.953000 audit[2768]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2768 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:19.953000 audit[2768]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdcb8926f0 a2=0 a3=7ffdcb8926dc items=0 ppid=2685 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.953000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 10 00:44:19.954000 audit[2769]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2769 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:19.954000 audit[2769]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff45ea26c0 a2=0 a3=7fff45ea26ac items=0 ppid=2685 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.954000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:44:19.957000 audit[2771]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:19.957000 audit[2771]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffda6806b50 a2=0 a3=7ffda6806b3c items=0 ppid=2685 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.957000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:44:19.959000 audit[2772]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_chain pid=2772 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:19.959000 audit[2772]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda599b410 a2=0 a3=7ffda599b3fc items=0 ppid=2685 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.959000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:44:19.962000 audit[2774]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2774 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:19.962000 audit[2774]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc637e8f50 a2=0 a3=7ffc637e8f3c items=0 ppid=2685 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:44:19.969000 audit[2777]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=2777 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:19.969000 audit[2777]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc54072630 a2=0 a3=7ffc5407261c items=0 ppid=2685 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.969000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:44:19.974000 audit[2780]: NETFILTER_CFG table=filter:62 family=2 entries=1 op=nft_register_rule pid=2780 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:19.974000 audit[2780]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc0d825050 a2=0 a3=7ffc0d82503c items=0 ppid=2685 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.974000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:44:19.976000 audit[2781]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_chain pid=2781 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:19.976000 audit[2781]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc44143500 a2=0 a3=7ffc441434ec items=0 ppid=2685 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.976000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:44:19.984000 audit[2783]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_rule pid=2783 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:19.984000 audit[2783]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff36b67b80 a2=0 a3=7fff36b67b6c items=0 ppid=2685 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.984000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:44:19.995000 audit[2786]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2786 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:19.995000 audit[2786]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe18d698d0 a2=0 a3=7ffe18d698bc items=0 ppid=2685 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.995000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:44:19.997000 audit[2787]: NETFILTER_CFG table=nat:66 family=2 entries=1 op=nft_register_chain pid=2787 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:19.997000 audit[2787]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8729aa50 a2=0 a3=7fff8729aa3c items=0 ppid=2685 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:19.997000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:44:20.001000 audit[2789]: NETFILTER_CFG table=nat:67 family=2 entries=1 op=nft_register_rule pid=2789 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:20.001000 audit[2789]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffec0bcaee0 a2=0 a3=7ffec0bcaecc items=0 ppid=2685 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.001000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:44:20.013619 systemd[1]: run-containerd-runc-k8s.io-4a49b99b2ed0e1cf0ccf93648175e715de719599f57df2ce32535ab1978082ce-runc.zQBVyA.mount: Deactivated successfully. May 10 00:44:20.108000 audit[2795]: NETFILTER_CFG table=filter:68 family=2 entries=8 op=nft_register_rule pid=2795 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:20.108000 audit[2795]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffdf40b7910 a2=0 a3=7ffdf40b78fc items=0 ppid=2685 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.108000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:20.160000 audit[2795]: NETFILTER_CFG table=nat:69 family=2 entries=14 op=nft_register_chain pid=2795 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:20.160000 audit[2795]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffdf40b7910 a2=0 a3=7ffdf40b78fc items=0 ppid=2685 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.160000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:20.162000 audit[2800]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.162000 audit[2800]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd7c188730 a2=0 a3=7ffd7c18871c items=0 ppid=2685 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.162000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:44:20.165000 audit[2802]: NETFILTER_CFG table=filter:71 family=10 entries=2 op=nft_register_chain pid=2802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.165000 audit[2802]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeb0913b70 a2=0 a3=7ffeb0913b5c items=0 ppid=2685 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 10 00:44:20.170000 audit[2805]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.170000 audit[2805]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc368c01e0 a2=0 a3=7ffc368c01cc items=0 ppid=2685 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.170000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 10 00:44:20.171000 audit[2806]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.171000 audit[2806]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe100c8600 a2=0 a3=7ffe100c85ec items=0 ppid=2685 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.171000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:44:20.174000 audit[2808]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.174000 audit[2808]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeeae22740 a2=0 a3=7ffeeae2272c items=0 ppid=2685 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.174000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:44:20.176000 audit[2809]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.176000 audit[2809]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce766e7f0 a2=0 a3=7ffce766e7dc items=0 ppid=2685 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.176000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:44:20.178000 audit[2811]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.178000 audit[2811]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcb4bad9f0 a2=0 a3=7ffcb4bad9dc items=0 ppid=2685 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.178000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 10 00:44:20.185000 audit[2814]: NETFILTER_CFG table=filter:77 family=10 entries=2 op=nft_register_chain pid=2814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.185000 audit[2814]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc3e0e6620 a2=0 a3=7ffc3e0e660c items=0 ppid=2685 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.185000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:44:20.187000 audit[2815]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2815 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.187000 audit[2815]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa9558570 a2=0 a3=7fffa955855c items=0 ppid=2685 pid=2815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.187000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:44:20.190000 audit[2817]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2817 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.190000 audit[2817]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe83feed20 a2=0 a3=7ffe83feed0c items=0 ppid=2685 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.190000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:44:20.191000 audit[2818]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_chain pid=2818 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.191000 audit[2818]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8755a770 a2=0 a3=7ffc8755a75c items=0 ppid=2685 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.191000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:44:20.194000 audit[2820]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2820 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.194000 audit[2820]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcada19e30 a2=0 a3=7ffcada19e1c items=0 ppid=2685 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.194000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:44:20.198000 audit[2823]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_rule pid=2823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.198000 audit[2823]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcc13ec820 a2=0 a3=7ffcc13ec80c items=0 ppid=2685 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.198000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:44:20.202000 audit[2826]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2826 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.202000 audit[2826]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed8cada80 a2=0 a3=7ffed8cada6c items=0 ppid=2685 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.202000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 10 00:44:20.203000 audit[2827]: NETFILTER_CFG table=nat:84 family=10 entries=1 op=nft_register_chain pid=2827 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.203000 audit[2827]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd80c84ff0 a2=0 a3=7ffd80c84fdc items=0 ppid=2685 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.203000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:44:20.206000 audit[2829]: NETFILTER_CFG table=nat:85 family=10 entries=2 op=nft_register_chain pid=2829 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.206000 audit[2829]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffff25f5560 a2=0 a3=7ffff25f554c items=0 ppid=2685 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.206000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:44:20.210000 audit[2832]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.210000 audit[2832]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdce3d1960 a2=0 a3=7ffdce3d194c items=0 ppid=2685 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.210000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:44:20.211000 audit[2833]: NETFILTER_CFG table=nat:87 family=10 entries=1 op=nft_register_chain pid=2833 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.211000 audit[2833]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe067430c0 a2=0 a3=7ffe067430ac items=0 ppid=2685 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.211000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:44:20.214000 audit[2835]: NETFILTER_CFG table=nat:88 family=10 entries=2 op=nft_register_chain pid=2835 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.214000 audit[2835]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc5f152f00 a2=0 a3=7ffc5f152eec items=0 ppid=2685 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.214000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:44:20.215000 audit[2836]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=2836 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.215000 audit[2836]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1c8df060 a2=0 a3=7ffd1c8df04c items=0 ppid=2685 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.215000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:44:20.218000 audit[2838]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=2838 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.218000 audit[2838]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc0ff6a890 a2=0 a3=7ffc0ff6a87c items=0 ppid=2685 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.218000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:44:20.223000 audit[2841]: NETFILTER_CFG table=filter:91 family=10 entries=1 op=nft_register_rule pid=2841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:20.223000 audit[2841]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc5dd99540 a2=0 a3=7ffc5dd9952c items=0 ppid=2685 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:44:20.227000 audit[2843]: NETFILTER_CFG table=filter:92 family=10 entries=3 op=nft_register_rule pid=2843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:44:20.227000 audit[2843]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffff16f6b40 a2=0 a3=7ffff16f6b2c items=0 ppid=2685 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.227000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:20.227000 audit[2843]: NETFILTER_CFG table=nat:93 family=10 entries=7 op=nft_register_chain pid=2843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:44:20.227000 audit[2843]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffff16f6b40 a2=0 a3=7ffff16f6b2c items=0 ppid=2685 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.227000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:21.437716 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1371965658.mount: Deactivated successfully. May 10 00:44:22.295747 env[1417]: time="2025-05-10T00:44:22.295638259Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:22.304515 env[1417]: time="2025-05-10T00:44:22.304351762Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:22.308697 env[1417]: time="2025-05-10T00:44:22.308636012Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:22.313633 env[1417]: time="2025-05-10T00:44:22.313566570Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:22.314686 env[1417]: time="2025-05-10T00:44:22.314638083Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 10 00:44:22.321456 env[1417]: time="2025-05-10T00:44:22.321357962Z" level=info msg="CreateContainer within sandbox \"d8fcfdba9a02e00e994bea6768aaba783213f563c94db4bf89b2ee22ec0ca264\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 10 00:44:22.351033 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1892357463.mount: Deactivated successfully. May 10 00:44:22.365632 env[1417]: time="2025-05-10T00:44:22.365558483Z" level=info msg="CreateContainer within sandbox \"d8fcfdba9a02e00e994bea6768aaba783213f563c94db4bf89b2ee22ec0ca264\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"a6c35a8877f790d9d4641517e0103cd24f7d49e636fb032e7eabb95078a16599\"" May 10 00:44:22.366370 env[1417]: time="2025-05-10T00:44:22.366207890Z" level=info msg="StartContainer for \"a6c35a8877f790d9d4641517e0103cd24f7d49e636fb032e7eabb95078a16599\"" May 10 00:44:22.391961 systemd[1]: Started cri-containerd-a6c35a8877f790d9d4641517e0103cd24f7d49e636fb032e7eabb95078a16599.scope. May 10 00:44:22.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.430000 audit: BPF prog-id=115 op=LOAD May 10 00:44:22.431000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2655 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:22.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136633335613838373766373930643964343634313531376530313033 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2655 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:22.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136633335613838373766373930643964343634313531376530313033 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit: BPF prog-id=116 op=LOAD May 10 00:44:22.431000 audit[2851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000024c90 items=0 ppid=2655 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:22.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136633335613838373766373930643964343634313531376530313033 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit: BPF prog-id=117 op=LOAD May 10 00:44:22.431000 audit[2851]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000024cd8 items=0 ppid=2655 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:22.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136633335613838373766373930643964343634313531376530313033 May 10 00:44:22.431000 audit: BPF prog-id=117 op=UNLOAD May 10 00:44:22.431000 audit: BPF prog-id=116 op=UNLOAD May 10 00:44:22.431000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:22.431000 audit: BPF prog-id=118 op=LOAD May 10 00:44:22.431000 audit[2851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0000250e8 items=0 ppid=2655 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:22.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136633335613838373766373930643964343634313531376530313033 May 10 00:44:22.462087 env[1417]: time="2025-05-10T00:44:22.462016519Z" level=info msg="StartContainer for \"a6c35a8877f790d9d4641517e0103cd24f7d49e636fb032e7eabb95078a16599\" returns successfully" May 10 00:44:25.774000 audit[2882]: NETFILTER_CFG table=filter:94 family=2 entries=15 op=nft_register_rule pid=2882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:25.795541 kernel: kauditd_printk_skb: 360 callbacks suppressed May 10 00:44:25.795748 kernel: audit: type=1325 audit(1746837865.774:936): table=filter:94 family=2 entries=15 op=nft_register_rule pid=2882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:25.802345 kernel: audit: type=1300 audit(1746837865.774:936): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd315c64f0 a2=0 a3=7ffd315c64dc items=0 ppid=2685 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:25.774000 audit[2882]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd315c64f0 a2=0 a3=7ffd315c64dc items=0 ppid=2685 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:25.774000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:25.856325 kernel: audit: type=1327 audit(1746837865.774:936): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:25.859000 audit[2882]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:25.906576 kernel: audit: type=1325 audit(1746837865.859:937): table=nat:95 family=2 entries=12 op=nft_register_rule pid=2882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:25.906769 kernel: audit: type=1300 audit(1746837865.859:937): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd315c64f0 a2=0 a3=0 items=0 ppid=2685 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:25.859000 audit[2882]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd315c64f0 a2=0 a3=0 items=0 ppid=2685 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:25.859000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:25.922275 kernel: audit: type=1327 audit(1746837865.859:937): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:25.927630 kubelet[2528]: I0510 00:44:25.927494 2528 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-797db67f8-kdb4h" podStartSLOduration=4.336197731 podStartE2EDuration="6.927439788s" podCreationTimestamp="2025-05-10 00:44:19 +0000 UTC" firstStartedPulling="2025-05-10 00:44:19.727630476 +0000 UTC m=+14.161557022" lastFinishedPulling="2025-05-10 00:44:22.318872533 +0000 UTC m=+16.752799079" observedRunningTime="2025-05-10 00:44:22.767772021 +0000 UTC m=+17.201698567" watchObservedRunningTime="2025-05-10 00:44:25.927439788 +0000 UTC m=+20.361366334" May 10 00:44:25.928392 kubelet[2528]: I0510 00:44:25.927857 2528 topology_manager.go:215] "Topology Admit Handler" podUID="46c20d50-bd85-4a8b-adab-cb27a9042824" podNamespace="calico-system" podName="calico-typha-579f64bb8-dn6xd" May 10 00:44:25.935912 systemd[1]: Created slice kubepods-besteffort-pod46c20d50_bd85_4a8b_adab_cb27a9042824.slice. May 10 00:44:25.967239 kubelet[2528]: I0510 00:44:25.967178 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qm6dz\" (UniqueName: \"kubernetes.io/projected/46c20d50-bd85-4a8b-adab-cb27a9042824-kube-api-access-qm6dz\") pod \"calico-typha-579f64bb8-dn6xd\" (UID: \"46c20d50-bd85-4a8b-adab-cb27a9042824\") " pod="calico-system/calico-typha-579f64bb8-dn6xd" May 10 00:44:25.967442 kubelet[2528]: I0510 00:44:25.967241 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/46c20d50-bd85-4a8b-adab-cb27a9042824-typha-certs\") pod \"calico-typha-579f64bb8-dn6xd\" (UID: \"46c20d50-bd85-4a8b-adab-cb27a9042824\") " pod="calico-system/calico-typha-579f64bb8-dn6xd" May 10 00:44:25.967442 kubelet[2528]: I0510 00:44:25.967314 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/46c20d50-bd85-4a8b-adab-cb27a9042824-tigera-ca-bundle\") pod \"calico-typha-579f64bb8-dn6xd\" (UID: \"46c20d50-bd85-4a8b-adab-cb27a9042824\") " pod="calico-system/calico-typha-579f64bb8-dn6xd" May 10 00:44:25.974000 audit[2884]: NETFILTER_CFG table=filter:96 family=2 entries=17 op=nft_register_rule pid=2884 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:25.987311 kernel: audit: type=1325 audit(1746837865.974:938): table=filter:96 family=2 entries=17 op=nft_register_rule pid=2884 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:25.974000 audit[2884]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffcaa578460 a2=0 a3=7ffcaa57844c items=0 ppid=2685 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:25.974000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:26.028346 kernel: audit: type=1300 audit(1746837865.974:938): arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffcaa578460 a2=0 a3=7ffcaa57844c items=0 ppid=2685 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:26.028535 kernel: audit: type=1327 audit(1746837865.974:938): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:26.028588 kernel: audit: type=1325 audit(1746837866.012:939): table=nat:97 family=2 entries=12 op=nft_register_rule pid=2884 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:26.012000 audit[2884]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=2884 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:26.012000 audit[2884]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcaa578460 a2=0 a3=0 items=0 ppid=2685 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:26.012000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:26.171673 kubelet[2528]: I0510 00:44:26.171606 2528 topology_manager.go:215] "Topology Admit Handler" podUID="1a0aca1e-bb40-49fe-a333-43c85658c634" podNamespace="calico-system" podName="calico-node-q4vkg" May 10 00:44:26.184715 systemd[1]: Created slice kubepods-besteffort-pod1a0aca1e_bb40_49fe_a333_43c85658c634.slice. May 10 00:44:26.244065 env[1417]: time="2025-05-10T00:44:26.243995325Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-579f64bb8-dn6xd,Uid:46c20d50-bd85-4a8b-adab-cb27a9042824,Namespace:calico-system,Attempt:0,}" May 10 00:44:26.269614 kubelet[2528]: I0510 00:44:26.269556 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1a0aca1e-bb40-49fe-a333-43c85658c634-cni-log-dir\") pod \"calico-node-q4vkg\" (UID: \"1a0aca1e-bb40-49fe-a333-43c85658c634\") " pod="calico-system/calico-node-q4vkg" May 10 00:44:26.269916 kubelet[2528]: I0510 00:44:26.269864 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8w94g\" (UniqueName: \"kubernetes.io/projected/1a0aca1e-bb40-49fe-a333-43c85658c634-kube-api-access-8w94g\") pod \"calico-node-q4vkg\" (UID: \"1a0aca1e-bb40-49fe-a333-43c85658c634\") " pod="calico-system/calico-node-q4vkg" May 10 00:44:26.270090 kubelet[2528]: I0510 00:44:26.270072 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1a0aca1e-bb40-49fe-a333-43c85658c634-var-run-calico\") pod \"calico-node-q4vkg\" (UID: \"1a0aca1e-bb40-49fe-a333-43c85658c634\") " pod="calico-system/calico-node-q4vkg" May 10 00:44:26.270239 kubelet[2528]: I0510 00:44:26.270222 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1a0aca1e-bb40-49fe-a333-43c85658c634-cni-bin-dir\") pod \"calico-node-q4vkg\" (UID: \"1a0aca1e-bb40-49fe-a333-43c85658c634\") " pod="calico-system/calico-node-q4vkg" May 10 00:44:26.270423 kubelet[2528]: I0510 00:44:26.270385 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1a0aca1e-bb40-49fe-a333-43c85658c634-cni-net-dir\") pod \"calico-node-q4vkg\" (UID: \"1a0aca1e-bb40-49fe-a333-43c85658c634\") " pod="calico-system/calico-node-q4vkg" May 10 00:44:26.270510 kubelet[2528]: I0510 00:44:26.270440 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1a0aca1e-bb40-49fe-a333-43c85658c634-node-certs\") pod \"calico-node-q4vkg\" (UID: \"1a0aca1e-bb40-49fe-a333-43c85658c634\") " pod="calico-system/calico-node-q4vkg" May 10 00:44:26.270510 kubelet[2528]: I0510 00:44:26.270465 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1a0aca1e-bb40-49fe-a333-43c85658c634-lib-modules\") pod \"calico-node-q4vkg\" (UID: \"1a0aca1e-bb40-49fe-a333-43c85658c634\") " pod="calico-system/calico-node-q4vkg" May 10 00:44:26.270610 kubelet[2528]: I0510 00:44:26.270505 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1a0aca1e-bb40-49fe-a333-43c85658c634-var-lib-calico\") pod \"calico-node-q4vkg\" (UID: \"1a0aca1e-bb40-49fe-a333-43c85658c634\") " pod="calico-system/calico-node-q4vkg" May 10 00:44:26.270610 kubelet[2528]: I0510 00:44:26.270532 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1a0aca1e-bb40-49fe-a333-43c85658c634-flexvol-driver-host\") pod \"calico-node-q4vkg\" (UID: \"1a0aca1e-bb40-49fe-a333-43c85658c634\") " pod="calico-system/calico-node-q4vkg" May 10 00:44:26.270610 kubelet[2528]: I0510 00:44:26.270572 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1a0aca1e-bb40-49fe-a333-43c85658c634-policysync\") pod \"calico-node-q4vkg\" (UID: \"1a0aca1e-bb40-49fe-a333-43c85658c634\") " pod="calico-system/calico-node-q4vkg" May 10 00:44:26.270610 kubelet[2528]: I0510 00:44:26.270598 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1a0aca1e-bb40-49fe-a333-43c85658c634-xtables-lock\") pod \"calico-node-q4vkg\" (UID: \"1a0aca1e-bb40-49fe-a333-43c85658c634\") " pod="calico-system/calico-node-q4vkg" May 10 00:44:26.270767 kubelet[2528]: I0510 00:44:26.270625 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1a0aca1e-bb40-49fe-a333-43c85658c634-tigera-ca-bundle\") pod \"calico-node-q4vkg\" (UID: \"1a0aca1e-bb40-49fe-a333-43c85658c634\") " pod="calico-system/calico-node-q4vkg" May 10 00:44:26.297705 env[1417]: time="2025-05-10T00:44:26.297518203Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:26.297705 env[1417]: time="2025-05-10T00:44:26.297629004Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:26.297705 env[1417]: time="2025-05-10T00:44:26.297665904Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:26.297978 env[1417]: time="2025-05-10T00:44:26.297868406Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/065e24b8d0320086ba8f17383f99b62511af6e2886920de78e3876d37962464d pid=2895 runtime=io.containerd.runc.v2 May 10 00:44:26.322795 systemd[1]: Started cri-containerd-065e24b8d0320086ba8f17383f99b62511af6e2886920de78e3876d37962464d.scope. May 10 00:44:26.342780 kubelet[2528]: I0510 00:44:26.342706 2528 topology_manager.go:215] "Topology Admit Handler" podUID="c60a92a9-8c7e-46c2-9455-69880570e281" podNamespace="calico-system" podName="csi-node-driver-lqtwf" May 10 00:44:26.343922 kubelet[2528]: E0510 00:44:26.343643 2528 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lqtwf" podUID="c60a92a9-8c7e-46c2-9455-69880570e281" May 10 00:44:26.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.363000 audit: BPF prog-id=119 op=LOAD May 10 00:44:26.364000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2895 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:26.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036356532346238643033323030383662613866313733383366393962 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2895 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:26.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036356532346238643033323030383662613866313733383366393962 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit: BPF prog-id=120 op=LOAD May 10 00:44:26.364000 audit[2905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e3a20 items=0 ppid=2895 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:26.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036356532346238643033323030383662613866313733383366393962 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit: BPF prog-id=121 op=LOAD May 10 00:44:26.364000 audit[2905]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e3a68 items=0 ppid=2895 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:26.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036356532346238643033323030383662613866313733383366393962 May 10 00:44:26.364000 audit: BPF prog-id=121 op=UNLOAD May 10 00:44:26.364000 audit: BPF prog-id=120 op=UNLOAD May 10 00:44:26.364000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.364000 audit: BPF prog-id=122 op=LOAD May 10 00:44:26.364000 audit[2905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e3e78 items=0 ppid=2895 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:26.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036356532346238643033323030383662613866313733383366393962 May 10 00:44:26.398595 kubelet[2528]: E0510 00:44:26.398538 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.398595 kubelet[2528]: W0510 00:44:26.398580 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.398849 kubelet[2528]: E0510 00:44:26.398615 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.407138 kubelet[2528]: E0510 00:44:26.406585 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.407138 kubelet[2528]: W0510 00:44:26.406621 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.407138 kubelet[2528]: E0510 00:44:26.406650 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.437509 kubelet[2528]: E0510 00:44:26.437465 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.437509 kubelet[2528]: W0510 00:44:26.437499 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.437815 kubelet[2528]: E0510 00:44:26.437532 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.437815 kubelet[2528]: E0510 00:44:26.437782 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.437815 kubelet[2528]: W0510 00:44:26.437793 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.437815 kubelet[2528]: E0510 00:44:26.437808 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.438009 kubelet[2528]: E0510 00:44:26.437998 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.438009 kubelet[2528]: W0510 00:44:26.438007 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.438173 kubelet[2528]: E0510 00:44:26.438020 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.438259 kubelet[2528]: E0510 00:44:26.438226 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.438319 kubelet[2528]: W0510 00:44:26.438275 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.438319 kubelet[2528]: E0510 00:44:26.438292 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.438516 kubelet[2528]: E0510 00:44:26.438504 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.438516 kubelet[2528]: W0510 00:44:26.438516 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.438650 kubelet[2528]: E0510 00:44:26.438530 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.439162 kubelet[2528]: E0510 00:44:26.438705 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.439162 kubelet[2528]: W0510 00:44:26.438721 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.439162 kubelet[2528]: E0510 00:44:26.438732 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.439162 kubelet[2528]: E0510 00:44:26.438905 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.439162 kubelet[2528]: W0510 00:44:26.438914 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.439162 kubelet[2528]: E0510 00:44:26.438929 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.439162 kubelet[2528]: E0510 00:44:26.439102 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.439162 kubelet[2528]: W0510 00:44:26.439113 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.439162 kubelet[2528]: E0510 00:44:26.439124 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.439690 kubelet[2528]: E0510 00:44:26.439389 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.439690 kubelet[2528]: W0510 00:44:26.439399 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.439690 kubelet[2528]: E0510 00:44:26.439412 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.439690 kubelet[2528]: E0510 00:44:26.439573 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.439690 kubelet[2528]: W0510 00:44:26.439582 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.439690 kubelet[2528]: E0510 00:44:26.439593 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.439984 kubelet[2528]: E0510 00:44:26.439788 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.439984 kubelet[2528]: W0510 00:44:26.439799 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.439984 kubelet[2528]: E0510 00:44:26.439813 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.439984 kubelet[2528]: E0510 00:44:26.439979 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.440287 kubelet[2528]: W0510 00:44:26.439988 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.440287 kubelet[2528]: E0510 00:44:26.439999 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.440287 kubelet[2528]: E0510 00:44:26.440180 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.440287 kubelet[2528]: W0510 00:44:26.440191 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.440287 kubelet[2528]: E0510 00:44:26.440205 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.440515 kubelet[2528]: E0510 00:44:26.440439 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.440515 kubelet[2528]: W0510 00:44:26.440449 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.440515 kubelet[2528]: E0510 00:44:26.440462 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.440649 kubelet[2528]: E0510 00:44:26.440620 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.440649 kubelet[2528]: W0510 00:44:26.440629 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.440649 kubelet[2528]: E0510 00:44:26.440639 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.440813 kubelet[2528]: E0510 00:44:26.440796 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.440813 kubelet[2528]: W0510 00:44:26.440811 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.440907 kubelet[2528]: E0510 00:44:26.440824 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.443276 kubelet[2528]: E0510 00:44:26.441010 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.443276 kubelet[2528]: W0510 00:44:26.441021 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.443276 kubelet[2528]: E0510 00:44:26.441033 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.443276 kubelet[2528]: E0510 00:44:26.441199 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.443276 kubelet[2528]: W0510 00:44:26.441208 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.443276 kubelet[2528]: E0510 00:44:26.441218 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.443276 kubelet[2528]: E0510 00:44:26.442833 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.443276 kubelet[2528]: W0510 00:44:26.442848 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.443276 kubelet[2528]: E0510 00:44:26.442865 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.443276 kubelet[2528]: E0510 00:44:26.443054 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.443758 kubelet[2528]: W0510 00:44:26.443064 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.443758 kubelet[2528]: E0510 00:44:26.443078 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.444856 env[1417]: time="2025-05-10T00:44:26.443952284Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-579f64bb8-dn6xd,Uid:46c20d50-bd85-4a8b-adab-cb27a9042824,Namespace:calico-system,Attempt:0,} returns sandbox id \"065e24b8d0320086ba8f17383f99b62511af6e2886920de78e3876d37962464d\"" May 10 00:44:26.446647 env[1417]: time="2025-05-10T00:44:26.446589112Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 10 00:44:26.472557 kubelet[2528]: E0510 00:44:26.472513 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.472842 kubelet[2528]: W0510 00:44:26.472821 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.472950 kubelet[2528]: E0510 00:44:26.472938 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.473070 kubelet[2528]: I0510 00:44:26.473054 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/c60a92a9-8c7e-46c2-9455-69880570e281-registration-dir\") pod \"csi-node-driver-lqtwf\" (UID: \"c60a92a9-8c7e-46c2-9455-69880570e281\") " pod="calico-system/csi-node-driver-lqtwf" May 10 00:44:26.473521 kubelet[2528]: E0510 00:44:26.473489 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.473521 kubelet[2528]: W0510 00:44:26.473514 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.474187 kubelet[2528]: E0510 00:44:26.473542 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.474539 kubelet[2528]: E0510 00:44:26.474512 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.474539 kubelet[2528]: W0510 00:44:26.474535 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.474692 kubelet[2528]: E0510 00:44:26.474646 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.474948 kubelet[2528]: E0510 00:44:26.474927 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.474948 kubelet[2528]: W0510 00:44:26.474947 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.475077 kubelet[2528]: E0510 00:44:26.474963 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.475077 kubelet[2528]: I0510 00:44:26.475004 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/c60a92a9-8c7e-46c2-9455-69880570e281-varrun\") pod \"csi-node-driver-lqtwf\" (UID: \"c60a92a9-8c7e-46c2-9455-69880570e281\") " pod="calico-system/csi-node-driver-lqtwf" May 10 00:44:26.475601 kubelet[2528]: E0510 00:44:26.475582 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.475717 kubelet[2528]: W0510 00:44:26.475701 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.475826 kubelet[2528]: E0510 00:44:26.475813 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.476228 kubelet[2528]: I0510 00:44:26.476209 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/c60a92a9-8c7e-46c2-9455-69880570e281-kubelet-dir\") pod \"csi-node-driver-lqtwf\" (UID: \"c60a92a9-8c7e-46c2-9455-69880570e281\") " pod="calico-system/csi-node-driver-lqtwf" May 10 00:44:26.482368 kubelet[2528]: E0510 00:44:26.476418 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.482368 kubelet[2528]: W0510 00:44:26.476431 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.482368 kubelet[2528]: E0510 00:44:26.476451 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.483168 kubelet[2528]: E0510 00:44:26.483131 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.483168 kubelet[2528]: W0510 00:44:26.483174 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.483400 kubelet[2528]: E0510 00:44:26.483217 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.489091 kubelet[2528]: E0510 00:44:26.485993 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.489091 kubelet[2528]: W0510 00:44:26.486213 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.489091 kubelet[2528]: E0510 00:44:26.486383 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.489091 kubelet[2528]: I0510 00:44:26.486686 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p97jw\" (UniqueName: \"kubernetes.io/projected/c60a92a9-8c7e-46c2-9455-69880570e281-kube-api-access-p97jw\") pod \"csi-node-driver-lqtwf\" (UID: \"c60a92a9-8c7e-46c2-9455-69880570e281\") " pod="calico-system/csi-node-driver-lqtwf" May 10 00:44:26.489091 kubelet[2528]: E0510 00:44:26.487567 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.489091 kubelet[2528]: W0510 00:44:26.487589 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.489091 kubelet[2528]: E0510 00:44:26.487637 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.491478 kubelet[2528]: E0510 00:44:26.491441 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.491478 kubelet[2528]: W0510 00:44:26.491474 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.491761 kubelet[2528]: E0510 00:44:26.491527 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.492102 kubelet[2528]: E0510 00:44:26.492063 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.492102 kubelet[2528]: W0510 00:44:26.492090 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.492286 kubelet[2528]: E0510 00:44:26.492112 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.492286 kubelet[2528]: I0510 00:44:26.492170 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/c60a92a9-8c7e-46c2-9455-69880570e281-socket-dir\") pod \"csi-node-driver-lqtwf\" (UID: \"c60a92a9-8c7e-46c2-9455-69880570e281\") " pod="calico-system/csi-node-driver-lqtwf" May 10 00:44:26.497392 kubelet[2528]: E0510 00:44:26.492937 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.497392 kubelet[2528]: W0510 00:44:26.492958 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.497392 kubelet[2528]: E0510 00:44:26.493085 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.497392 kubelet[2528]: E0510 00:44:26.493285 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.497392 kubelet[2528]: W0510 00:44:26.493297 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.497392 kubelet[2528]: E0510 00:44:26.493316 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.497392 kubelet[2528]: E0510 00:44:26.493676 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.497392 kubelet[2528]: W0510 00:44:26.493691 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.497392 kubelet[2528]: E0510 00:44:26.493708 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.497392 kubelet[2528]: E0510 00:44:26.493944 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.498097 kubelet[2528]: W0510 00:44:26.493977 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.498097 kubelet[2528]: E0510 00:44:26.493991 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.498851 env[1417]: time="2025-05-10T00:44:26.498790276Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-q4vkg,Uid:1a0aca1e-bb40-49fe-a333-43c85658c634,Namespace:calico-system,Attempt:0,}" May 10 00:44:26.584075 env[1417]: time="2025-05-10T00:44:26.574219191Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:26.584075 env[1417]: time="2025-05-10T00:44:26.574398693Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:26.584075 env[1417]: time="2025-05-10T00:44:26.574433193Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:26.584075 env[1417]: time="2025-05-10T00:44:26.574681796Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0ff1b40148e1d9a3211c8f1b871221280141bfaf567e31e8645742e03b20f1a6 pid=2972 runtime=io.containerd.runc.v2 May 10 00:44:26.594931 kubelet[2528]: E0510 00:44:26.594416 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.594931 kubelet[2528]: W0510 00:44:26.594468 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.594931 kubelet[2528]: E0510 00:44:26.594520 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.595685 kubelet[2528]: E0510 00:44:26.595392 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.595685 kubelet[2528]: W0510 00:44:26.595431 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.595685 kubelet[2528]: E0510 00:44:26.595474 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.595905 kubelet[2528]: E0510 00:44:26.595878 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.595905 kubelet[2528]: W0510 00:44:26.595895 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.595996 kubelet[2528]: E0510 00:44:26.595918 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.597191 kubelet[2528]: E0510 00:44:26.596188 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.597191 kubelet[2528]: W0510 00:44:26.596203 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.597191 kubelet[2528]: E0510 00:44:26.596225 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.597191 kubelet[2528]: E0510 00:44:26.596470 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.597191 kubelet[2528]: W0510 00:44:26.596480 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.597191 kubelet[2528]: E0510 00:44:26.596493 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.597191 kubelet[2528]: E0510 00:44:26.596742 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.597191 kubelet[2528]: W0510 00:44:26.596754 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.597191 kubelet[2528]: E0510 00:44:26.596768 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.597191 kubelet[2528]: E0510 00:44:26.596965 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.597756 kubelet[2528]: W0510 00:44:26.596976 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.597756 kubelet[2528]: E0510 00:44:26.596989 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.597756 kubelet[2528]: E0510 00:44:26.597168 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.597756 kubelet[2528]: W0510 00:44:26.597178 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.597756 kubelet[2528]: E0510 00:44:26.597190 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.597756 kubelet[2528]: E0510 00:44:26.597456 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.597756 kubelet[2528]: W0510 00:44:26.597467 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.597756 kubelet[2528]: E0510 00:44:26.597483 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.597756 kubelet[2528]: E0510 00:44:26.597694 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.597756 kubelet[2528]: W0510 00:44:26.597704 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.598337 kubelet[2528]: E0510 00:44:26.597715 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.598337 kubelet[2528]: E0510 00:44:26.597990 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.598337 kubelet[2528]: W0510 00:44:26.598003 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.598337 kubelet[2528]: E0510 00:44:26.598021 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.598337 kubelet[2528]: E0510 00:44:26.598195 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.598337 kubelet[2528]: W0510 00:44:26.598205 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.598337 kubelet[2528]: E0510 00:44:26.598217 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.598615 kubelet[2528]: E0510 00:44:26.598437 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.598615 kubelet[2528]: W0510 00:44:26.598446 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.598615 kubelet[2528]: E0510 00:44:26.598458 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.601320 kubelet[2528]: E0510 00:44:26.598940 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.601320 kubelet[2528]: W0510 00:44:26.598955 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.601320 kubelet[2528]: E0510 00:44:26.598974 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.601320 kubelet[2528]: E0510 00:44:26.599183 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.601320 kubelet[2528]: W0510 00:44:26.599194 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.601320 kubelet[2528]: E0510 00:44:26.599286 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.601320 kubelet[2528]: E0510 00:44:26.599402 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.601320 kubelet[2528]: W0510 00:44:26.599411 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.601320 kubelet[2528]: E0510 00:44:26.599491 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.601320 kubelet[2528]: E0510 00:44:26.599608 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.601862 kubelet[2528]: W0510 00:44:26.599616 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.601862 kubelet[2528]: E0510 00:44:26.599632 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.601862 kubelet[2528]: E0510 00:44:26.599810 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.601862 kubelet[2528]: W0510 00:44:26.599820 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.601862 kubelet[2528]: E0510 00:44:26.599839 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.601862 kubelet[2528]: E0510 00:44:26.600018 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.601862 kubelet[2528]: W0510 00:44:26.600027 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.601862 kubelet[2528]: E0510 00:44:26.600042 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.601862 kubelet[2528]: E0510 00:44:26.600444 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.601862 kubelet[2528]: W0510 00:44:26.600456 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.602316 kubelet[2528]: E0510 00:44:26.600547 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.602316 kubelet[2528]: E0510 00:44:26.600688 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.602316 kubelet[2528]: W0510 00:44:26.600697 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.602316 kubelet[2528]: E0510 00:44:26.600777 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.602316 kubelet[2528]: E0510 00:44:26.600917 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.602316 kubelet[2528]: W0510 00:44:26.600926 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.602316 kubelet[2528]: E0510 00:44:26.600943 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.602316 kubelet[2528]: E0510 00:44:26.601137 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.602316 kubelet[2528]: W0510 00:44:26.601149 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.602316 kubelet[2528]: E0510 00:44:26.601166 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.602703 kubelet[2528]: E0510 00:44:26.601583 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.602703 kubelet[2528]: W0510 00:44:26.601595 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.602703 kubelet[2528]: E0510 00:44:26.601615 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.602703 kubelet[2528]: E0510 00:44:26.601830 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.602703 kubelet[2528]: W0510 00:44:26.601842 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.602703 kubelet[2528]: E0510 00:44:26.601854 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.609646 systemd[1]: Started cri-containerd-0ff1b40148e1d9a3211c8f1b871221280141bfaf567e31e8645742e03b20f1a6.scope. May 10 00:44:26.620324 kubelet[2528]: E0510 00:44:26.619488 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:26.620324 kubelet[2528]: W0510 00:44:26.619516 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:26.620324 kubelet[2528]: E0510 00:44:26.619548 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:26.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.642000 audit: BPF prog-id=123 op=LOAD May 10 00:44:26.643000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.643000 audit[2984]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2972 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:26.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663162343031343865316439613332313163386631623837313232 May 10 00:44:26.643000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.643000 audit[2984]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2972 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:26.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663162343031343865316439613332313163386631623837313232 May 10 00:44:26.643000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.643000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.643000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.643000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.643000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.643000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.643000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.643000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.643000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.643000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.643000 audit: BPF prog-id=124 op=LOAD May 10 00:44:26.643000 audit[2984]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002c9cd0 items=0 ppid=2972 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:26.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663162343031343865316439613332313163386631623837313232 May 10 00:44:26.643000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.643000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.643000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.643000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.643000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.643000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.643000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.643000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.643000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.643000 audit: BPF prog-id=125 op=LOAD May 10 00:44:26.643000 audit[2984]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002c9d18 items=0 ppid=2972 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:26.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663162343031343865316439613332313163386631623837313232 May 10 00:44:26.643000 audit: BPF prog-id=125 op=UNLOAD May 10 00:44:26.643000 audit: BPF prog-id=124 op=UNLOAD May 10 00:44:26.644000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.644000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.644000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.644000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.644000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.644000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.644000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.644000 audit[2984]: AVC avc: denied { perfmon } for pid=2984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.644000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.644000 audit[2984]: AVC avc: denied { bpf } for pid=2984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:26.644000 audit: BPF prog-id=126 op=LOAD May 10 00:44:26.644000 audit[2984]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003b4128 items=0 ppid=2972 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:26.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663162343031343865316439613332313163386631623837313232 May 10 00:44:26.663880 env[1417]: time="2025-05-10T00:44:26.663812358Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-q4vkg,Uid:1a0aca1e-bb40-49fe-a333-43c85658c634,Namespace:calico-system,Attempt:0,} returns sandbox id \"0ff1b40148e1d9a3211c8f1b871221280141bfaf567e31e8645742e03b20f1a6\"" May 10 00:44:27.056000 audit[3037]: NETFILTER_CFG table=filter:98 family=2 entries=18 op=nft_register_rule pid=3037 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:27.056000 audit[3037]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffd1b4f3df0 a2=0 a3=7ffd1b4f3ddc items=0 ppid=2685 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:27.056000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:27.059000 audit[3037]: NETFILTER_CFG table=nat:99 family=2 entries=12 op=nft_register_rule pid=3037 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:27.059000 audit[3037]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd1b4f3df0 a2=0 a3=0 items=0 ppid=2685 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:27.059000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:27.085384 systemd[1]: run-containerd-runc-k8s.io-065e24b8d0320086ba8f17383f99b62511af6e2886920de78e3876d37962464d-runc.i267iw.mount: Deactivated successfully. May 10 00:44:27.654924 kubelet[2528]: E0510 00:44:27.653653 2528 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lqtwf" podUID="c60a92a9-8c7e-46c2-9455-69880570e281" May 10 00:44:28.864857 env[1417]: time="2025-05-10T00:44:28.864791815Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:28.873369 env[1417]: time="2025-05-10T00:44:28.873311803Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:28.882950 env[1417]: time="2025-05-10T00:44:28.882875002Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:28.888478 env[1417]: time="2025-05-10T00:44:28.888421860Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:28.889049 env[1417]: time="2025-05-10T00:44:28.889010666Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 10 00:44:28.892035 env[1417]: time="2025-05-10T00:44:28.891986697Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 10 00:44:28.913631 env[1417]: time="2025-05-10T00:44:28.913570420Z" level=info msg="CreateContainer within sandbox \"065e24b8d0320086ba8f17383f99b62511af6e2886920de78e3876d37962464d\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 10 00:44:28.955266 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2428877842.mount: Deactivated successfully. May 10 00:44:28.981273 env[1417]: time="2025-05-10T00:44:28.981196720Z" level=info msg="CreateContainer within sandbox \"065e24b8d0320086ba8f17383f99b62511af6e2886920de78e3876d37962464d\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"3a6bd05e00a0b81c424033a002cc36f944835faa55c06b777fcc5dffdb5711af\"" May 10 00:44:28.982262 env[1417]: time="2025-05-10T00:44:28.982198931Z" level=info msg="StartContainer for \"3a6bd05e00a0b81c424033a002cc36f944835faa55c06b777fcc5dffdb5711af\"" May 10 00:44:29.011883 systemd[1]: Started cri-containerd-3a6bd05e00a0b81c424033a002cc36f944835faa55c06b777fcc5dffdb5711af.scope. May 10 00:44:29.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.033000 audit: BPF prog-id=127 op=LOAD May 10 00:44:29.034000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2895 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:29.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361366264303565303061306238316334323430333361303032636333 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2895 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:29.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361366264303565303061306238316334323430333361303032636333 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit: BPF prog-id=128 op=LOAD May 10 00:44:29.034000 audit[3048]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00029d010 items=0 ppid=2895 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:29.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361366264303565303061306238316334323430333361303032636333 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit: BPF prog-id=129 op=LOAD May 10 00:44:29.034000 audit[3048]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00029d058 items=0 ppid=2895 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:29.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361366264303565303061306238316334323430333361303032636333 May 10 00:44:29.034000 audit: BPF prog-id=129 op=UNLOAD May 10 00:44:29.034000 audit: BPF prog-id=128 op=UNLOAD May 10 00:44:29.034000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:29.034000 audit: BPF prog-id=130 op=LOAD May 10 00:44:29.034000 audit[3048]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00029d468 items=0 ppid=2895 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:29.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361366264303565303061306238316334323430333361303032636333 May 10 00:44:29.078223 env[1417]: time="2025-05-10T00:44:29.078149608Z" level=info msg="StartContainer for \"3a6bd05e00a0b81c424033a002cc36f944835faa55c06b777fcc5dffdb5711af\" returns successfully" May 10 00:44:29.657095 kubelet[2528]: E0510 00:44:29.657040 2528 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lqtwf" podUID="c60a92a9-8c7e-46c2-9455-69880570e281" May 10 00:44:29.822818 kubelet[2528]: I0510 00:44:29.822735 2528 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-579f64bb8-dn6xd" podStartSLOduration=2.377775278 podStartE2EDuration="4.822688958s" podCreationTimestamp="2025-05-10 00:44:25 +0000 UTC" firstStartedPulling="2025-05-10 00:44:26.445889105 +0000 UTC m=+20.879815751" lastFinishedPulling="2025-05-10 00:44:28.890802785 +0000 UTC m=+23.324729431" observedRunningTime="2025-05-10 00:44:29.808459113 +0000 UTC m=+24.242385759" watchObservedRunningTime="2025-05-10 00:44:29.822688958 +0000 UTC m=+24.256615504" May 10 00:44:29.856000 audit[3083]: NETFILTER_CFG table=filter:100 family=2 entries=17 op=nft_register_rule pid=3083 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:29.856000 audit[3083]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdec8c76a0 a2=0 a3=7ffdec8c768c items=0 ppid=2685 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:29.856000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:29.862000 audit[3083]: NETFILTER_CFG table=nat:101 family=2 entries=19 op=nft_register_chain pid=3083 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:29.862000 audit[3083]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffdec8c76a0 a2=0 a3=7ffdec8c768c items=0 ppid=2685 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:29.862000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:29.877378 kubelet[2528]: E0510 00:44:29.877337 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.877378 kubelet[2528]: W0510 00:44:29.877367 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.877685 kubelet[2528]: E0510 00:44:29.877397 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.877685 kubelet[2528]: E0510 00:44:29.877628 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.877685 kubelet[2528]: W0510 00:44:29.877640 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.877685 kubelet[2528]: E0510 00:44:29.877653 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.877902 kubelet[2528]: E0510 00:44:29.877823 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.877902 kubelet[2528]: W0510 00:44:29.877832 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.877902 kubelet[2528]: E0510 00:44:29.877844 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.878055 kubelet[2528]: E0510 00:44:29.878015 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.878055 kubelet[2528]: W0510 00:44:29.878025 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.878055 kubelet[2528]: E0510 00:44:29.878036 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.878235 kubelet[2528]: E0510 00:44:29.878211 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.878331 kubelet[2528]: W0510 00:44:29.878253 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.878331 kubelet[2528]: E0510 00:44:29.878268 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.878734 kubelet[2528]: E0510 00:44:29.878708 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.878734 kubelet[2528]: W0510 00:44:29.878727 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.878924 kubelet[2528]: E0510 00:44:29.878745 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.878984 kubelet[2528]: E0510 00:44:29.878954 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.878984 kubelet[2528]: W0510 00:44:29.878965 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.878984 kubelet[2528]: E0510 00:44:29.878979 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.879164 kubelet[2528]: E0510 00:44:29.879147 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.879164 kubelet[2528]: W0510 00:44:29.879163 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.879317 kubelet[2528]: E0510 00:44:29.879175 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.879410 kubelet[2528]: E0510 00:44:29.879391 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.879410 kubelet[2528]: W0510 00:44:29.879407 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.879518 kubelet[2528]: E0510 00:44:29.879433 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.879692 kubelet[2528]: E0510 00:44:29.879672 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.879692 kubelet[2528]: W0510 00:44:29.879688 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.879817 kubelet[2528]: E0510 00:44:29.879701 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.879975 kubelet[2528]: E0510 00:44:29.879959 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.879975 kubelet[2528]: W0510 00:44:29.879972 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.880099 kubelet[2528]: E0510 00:44:29.879985 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.880282 kubelet[2528]: E0510 00:44:29.880233 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.880282 kubelet[2528]: W0510 00:44:29.880262 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.880282 kubelet[2528]: E0510 00:44:29.880280 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.880582 kubelet[2528]: E0510 00:44:29.880557 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.880582 kubelet[2528]: W0510 00:44:29.880582 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.880697 kubelet[2528]: E0510 00:44:29.880597 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.880877 kubelet[2528]: E0510 00:44:29.880860 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.880877 kubelet[2528]: W0510 00:44:29.880873 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.880999 kubelet[2528]: E0510 00:44:29.880889 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.881159 kubelet[2528]: E0510 00:44:29.881143 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.881159 kubelet[2528]: W0510 00:44:29.881155 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.881300 kubelet[2528]: E0510 00:44:29.881173 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.932935 kubelet[2528]: E0510 00:44:29.931758 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.932935 kubelet[2528]: W0510 00:44:29.931785 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.932935 kubelet[2528]: E0510 00:44:29.931813 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.934806 kubelet[2528]: E0510 00:44:29.934768 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.934806 kubelet[2528]: W0510 00:44:29.934803 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.935155 kubelet[2528]: E0510 00:44:29.934837 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.935231 kubelet[2528]: E0510 00:44:29.935206 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.935231 kubelet[2528]: W0510 00:44:29.935220 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.935363 kubelet[2528]: E0510 00:44:29.935237 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.935617 kubelet[2528]: E0510 00:44:29.935539 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.935617 kubelet[2528]: W0510 00:44:29.935612 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.935764 kubelet[2528]: E0510 00:44:29.935632 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.936109 kubelet[2528]: E0510 00:44:29.936054 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.936109 kubelet[2528]: W0510 00:44:29.936070 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.936109 kubelet[2528]: E0510 00:44:29.936090 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.936433 kubelet[2528]: E0510 00:44:29.936383 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.936433 kubelet[2528]: W0510 00:44:29.936394 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.936433 kubelet[2528]: E0510 00:44:29.936409 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.936758 kubelet[2528]: E0510 00:44:29.936738 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.936758 kubelet[2528]: W0510 00:44:29.936754 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.936970 kubelet[2528]: E0510 00:44:29.936922 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.937183 kubelet[2528]: E0510 00:44:29.936954 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.937299 kubelet[2528]: W0510 00:44:29.937186 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.937509 kubelet[2528]: E0510 00:44:29.937399 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.937509 kubelet[2528]: W0510 00:44:29.937413 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.937509 kubelet[2528]: E0510 00:44:29.937483 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.937697 kubelet[2528]: E0510 00:44:29.937690 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.937748 kubelet[2528]: W0510 00:44:29.937701 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.937748 kubelet[2528]: E0510 00:44:29.937715 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.940502 kubelet[2528]: E0510 00:44:29.937881 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.940502 kubelet[2528]: W0510 00:44:29.937893 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.940502 kubelet[2528]: E0510 00:44:29.937906 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.940502 kubelet[2528]: E0510 00:44:29.938125 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.940502 kubelet[2528]: W0510 00:44:29.938135 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.940502 kubelet[2528]: E0510 00:44:29.938146 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.940502 kubelet[2528]: E0510 00:44:29.938742 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.940502 kubelet[2528]: W0510 00:44:29.938771 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.940502 kubelet[2528]: E0510 00:44:29.938785 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.940502 kubelet[2528]: E0510 00:44:29.938818 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.941134 kubelet[2528]: E0510 00:44:29.939008 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.941134 kubelet[2528]: W0510 00:44:29.939021 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.941134 kubelet[2528]: E0510 00:44:29.939034 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.941134 kubelet[2528]: E0510 00:44:29.939201 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.941134 kubelet[2528]: W0510 00:44:29.939209 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.941134 kubelet[2528]: E0510 00:44:29.939221 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.941134 kubelet[2528]: E0510 00:44:29.940222 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.941134 kubelet[2528]: W0510 00:44:29.940234 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.941134 kubelet[2528]: E0510 00:44:29.940366 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.941134 kubelet[2528]: E0510 00:44:29.941082 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.941800 kubelet[2528]: W0510 00:44:29.941094 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.941800 kubelet[2528]: E0510 00:44:29.941108 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:29.944184 kubelet[2528]: E0510 00:44:29.944063 2528 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:29.944184 kubelet[2528]: W0510 00:44:29.944103 2528 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:29.944184 kubelet[2528]: E0510 00:44:29.944131 2528 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:30.246856 env[1417]: time="2025-05-10T00:44:30.246695807Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:30.254139 env[1417]: time="2025-05-10T00:44:30.254065180Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:30.257975 env[1417]: time="2025-05-10T00:44:30.257905718Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:30.264511 env[1417]: time="2025-05-10T00:44:30.264121980Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:30.265347 env[1417]: time="2025-05-10T00:44:30.265197391Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 10 00:44:30.269146 env[1417]: time="2025-05-10T00:44:30.269091830Z" level=info msg="CreateContainer within sandbox \"0ff1b40148e1d9a3211c8f1b871221280141bfaf567e31e8645742e03b20f1a6\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:44:30.329679 env[1417]: time="2025-05-10T00:44:30.329613231Z" level=info msg="CreateContainer within sandbox \"0ff1b40148e1d9a3211c8f1b871221280141bfaf567e31e8645742e03b20f1a6\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"afe57bded12d29de05b06a88642902dc3f58a64f4eec8610520f74d95432b0ab\"" May 10 00:44:30.332092 env[1417]: time="2025-05-10T00:44:30.330634541Z" level=info msg="StartContainer for \"afe57bded12d29de05b06a88642902dc3f58a64f4eec8610520f74d95432b0ab\"" May 10 00:44:30.390816 systemd[1]: Started cri-containerd-afe57bded12d29de05b06a88642902dc3f58a64f4eec8610520f74d95432b0ab.scope. May 10 00:44:30.438000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fc07d062208 items=0 ppid=2972 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166653537626465643132643239646530356230366138383634323930 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit: BPF prog-id=131 op=LOAD May 10 00:44:30.438000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000210988 items=0 ppid=2972 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166653537626465643132643239646530356230366138383634323930 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit: BPF prog-id=132 op=LOAD May 10 00:44:30.438000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0002109d8 items=0 ppid=2972 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166653537626465643132643239646530356230366138383634323930 May 10 00:44:30.438000 audit: BPF prog-id=132 op=UNLOAD May 10 00:44:30.438000 audit: BPF prog-id=131 op=UNLOAD May 10 00:44:30.438000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.438000 audit: BPF prog-id=133 op=LOAD May 10 00:44:30.438000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000210a68 items=0 ppid=2972 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166653537626465643132643239646530356230366138383634323930 May 10 00:44:30.468592 env[1417]: time="2025-05-10T00:44:30.468525411Z" level=info msg="StartContainer for \"afe57bded12d29de05b06a88642902dc3f58a64f4eec8610520f74d95432b0ab\" returns successfully" May 10 00:44:30.484533 systemd[1]: cri-containerd-afe57bded12d29de05b06a88642902dc3f58a64f4eec8610520f74d95432b0ab.scope: Deactivated successfully. May 10 00:44:30.486000 audit: BPF prog-id=133 op=UNLOAD May 10 00:44:30.513925 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-afe57bded12d29de05b06a88642902dc3f58a64f4eec8610520f74d95432b0ab-rootfs.mount: Deactivated successfully. May 10 00:44:31.654017 kubelet[2528]: E0510 00:44:31.653956 2528 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lqtwf" podUID="c60a92a9-8c7e-46c2-9455-69880570e281" May 10 00:44:31.893410 env[1417]: time="2025-05-10T00:44:31.891485569Z" level=info msg="shim disconnected" id=afe57bded12d29de05b06a88642902dc3f58a64f4eec8610520f74d95432b0ab May 10 00:44:31.893410 env[1417]: time="2025-05-10T00:44:31.891563370Z" level=warning msg="cleaning up after shim disconnected" id=afe57bded12d29de05b06a88642902dc3f58a64f4eec8610520f74d95432b0ab namespace=k8s.io May 10 00:44:31.893410 env[1417]: time="2025-05-10T00:44:31.891577870Z" level=info msg="cleaning up dead shim" May 10 00:44:31.905153 env[1417]: time="2025-05-10T00:44:31.904509196Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:44:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3165 runtime=io.containerd.runc.v2\n" May 10 00:44:32.797925 env[1417]: time="2025-05-10T00:44:32.797850239Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 10 00:44:33.655671 kubelet[2528]: E0510 00:44:33.655612 2528 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lqtwf" podUID="c60a92a9-8c7e-46c2-9455-69880570e281" May 10 00:44:35.654933 kubelet[2528]: E0510 00:44:35.654869 2528 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lqtwf" podUID="c60a92a9-8c7e-46c2-9455-69880570e281" May 10 00:44:37.527021 env[1417]: time="2025-05-10T00:44:37.526954085Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:37.537338 env[1417]: time="2025-05-10T00:44:37.537284874Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:37.543651 env[1417]: time="2025-05-10T00:44:37.543597329Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:37.549952 env[1417]: time="2025-05-10T00:44:37.549900183Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:37.551013 env[1417]: time="2025-05-10T00:44:37.550532989Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 10 00:44:37.555722 env[1417]: time="2025-05-10T00:44:37.555400331Z" level=info msg="CreateContainer within sandbox \"0ff1b40148e1d9a3211c8f1b871221280141bfaf567e31e8645742e03b20f1a6\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:44:37.608815 env[1417]: time="2025-05-10T00:44:37.608736093Z" level=info msg="CreateContainer within sandbox \"0ff1b40148e1d9a3211c8f1b871221280141bfaf567e31e8645742e03b20f1a6\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"0c1225882357e862a1436781763b9696c007fd912ad704e033aaed91595a5aff\"" May 10 00:44:37.611240 env[1417]: time="2025-05-10T00:44:37.609815502Z" level=info msg="StartContainer for \"0c1225882357e862a1436781763b9696c007fd912ad704e033aaed91595a5aff\"" May 10 00:44:37.652914 systemd[1]: Started cri-containerd-0c1225882357e862a1436781763b9696c007fd912ad704e033aaed91595a5aff.scope. May 10 00:44:37.654431 kubelet[2528]: E0510 00:44:37.653835 2528 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lqtwf" podUID="c60a92a9-8c7e-46c2-9455-69880570e281" May 10 00:44:37.672000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.679563 kernel: kauditd_printk_skb: 229 callbacks suppressed May 10 00:44:37.679698 kernel: audit: type=1400 audit(1746837877.672:1005): avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.723278 kernel: audit: type=1300 audit(1746837877.672:1005): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f415041ff88 items=0 ppid=2972 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.672000 audit[3187]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f415041ff88 items=0 ppid=2972 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063313232353838323335376538363261313433363738313736336239 May 10 00:44:37.762303 kernel: audit: type=1327 audit(1746837877.672:1005): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063313232353838323335376538363261313433363738313736336239 May 10 00:44:37.672000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.795937 kernel: audit: type=1400 audit(1746837877.672:1006): avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.796093 kernel: audit: type=1400 audit(1746837877.672:1006): avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.672000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.807292 env[1417]: time="2025-05-10T00:44:37.807212712Z" level=info msg="StartContainer for \"0c1225882357e862a1436781763b9696c007fd912ad704e033aaed91595a5aff\" returns successfully" May 10 00:44:37.672000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.821957 kernel: audit: type=1400 audit(1746837877.672:1006): avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.840090 kernel: audit: type=1400 audit(1746837877.672:1006): avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.672000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.672000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.866548 kernel: audit: type=1400 audit(1746837877.672:1006): avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.866751 kernel: audit: type=1400 audit(1746837877.672:1006): avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.672000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.672000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.893125 kernel: audit: type=1400 audit(1746837877.672:1006): avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.672000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.672000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.672000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.672000 audit: BPF prog-id=134 op=LOAD May 10 00:44:37.672000 audit[3187]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000318548 items=0 ppid=2972 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063313232353838323335376538363261313433363738313736336239 May 10 00:44:37.693000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.693000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.693000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.693000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.693000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.693000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.693000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.693000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.693000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.693000 audit: BPF prog-id=135 op=LOAD May 10 00:44:37.693000 audit[3187]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000318598 items=0 ppid=2972 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063313232353838323335376538363261313433363738313736336239 May 10 00:44:37.693000 audit: BPF prog-id=135 op=UNLOAD May 10 00:44:37.693000 audit: BPF prog-id=134 op=UNLOAD May 10 00:44:37.693000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.693000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.693000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.693000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.693000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.693000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.693000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.693000 audit[3187]: AVC avc: denied { perfmon } for pid=3187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.693000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.693000 audit[3187]: AVC avc: denied { bpf } for pid=3187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.693000 audit: BPF prog-id=136 op=LOAD May 10 00:44:37.693000 audit[3187]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000318628 items=0 ppid=2972 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063313232353838323335376538363261313433363738313736336239 May 10 00:44:39.436194 env[1417]: time="2025-05-10T00:44:39.436102525Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:44:39.439390 systemd[1]: cri-containerd-0c1225882357e862a1436781763b9696c007fd912ad704e033aaed91595a5aff.scope: Deactivated successfully. May 10 00:44:39.444000 audit: BPF prog-id=136 op=UNLOAD May 10 00:44:39.458618 kubelet[2528]: I0510 00:44:39.458501 2528 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 10 00:44:39.485909 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0c1225882357e862a1436781763b9696c007fd912ad704e033aaed91595a5aff-rootfs.mount: Deactivated successfully. May 10 00:44:39.528804 kubelet[2528]: I0510 00:44:39.528731 2528 topology_manager.go:215] "Topology Admit Handler" podUID="346b5d8f-193c-4fe4-b4b6-46de7f98db5b" podNamespace="kube-system" podName="coredns-7db6d8ff4d-w84t7" May 10 00:44:40.034870 kubelet[2528]: I0510 00:44:39.539063 2528 topology_manager.go:215] "Topology Admit Handler" podUID="34f77ccb-223c-4aec-af9c-f1311dfd9100" podNamespace="kube-system" podName="coredns-7db6d8ff4d-4b7hx" May 10 00:44:40.034870 kubelet[2528]: I0510 00:44:39.545910 2528 topology_manager.go:215] "Topology Admit Handler" podUID="5c5ae991-5c69-4151-badb-79442d925e88" podNamespace="calico-apiserver" podName="calico-apiserver-6f6796fc67-z4mcn" May 10 00:44:40.034870 kubelet[2528]: I0510 00:44:39.546206 2528 topology_manager.go:215] "Topology Admit Handler" podUID="28042a2c-6cae-434f-a489-539111320f12" podNamespace="calico-apiserver" podName="calico-apiserver-6f6796fc67-mfm9v" May 10 00:44:40.034870 kubelet[2528]: I0510 00:44:39.557430 2528 topology_manager.go:215] "Topology Admit Handler" podUID="283e0cc9-b0f3-4c21-b09c-2a9c6cb13ecb" podNamespace="calico-system" podName="calico-kube-controllers-d465f4dc7-tgv6g" May 10 00:44:40.034870 kubelet[2528]: I0510 00:44:39.608397 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dcvqv\" (UniqueName: \"kubernetes.io/projected/283e0cc9-b0f3-4c21-b09c-2a9c6cb13ecb-kube-api-access-dcvqv\") pod \"calico-kube-controllers-d465f4dc7-tgv6g\" (UID: \"283e0cc9-b0f3-4c21-b09c-2a9c6cb13ecb\") " pod="calico-system/calico-kube-controllers-d465f4dc7-tgv6g" May 10 00:44:40.034870 kubelet[2528]: I0510 00:44:39.608460 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/34f77ccb-223c-4aec-af9c-f1311dfd9100-config-volume\") pod \"coredns-7db6d8ff4d-4b7hx\" (UID: \"34f77ccb-223c-4aec-af9c-f1311dfd9100\") " pod="kube-system/coredns-7db6d8ff4d-4b7hx" May 10 00:44:40.034870 kubelet[2528]: I0510 00:44:39.608488 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b7f8j\" (UniqueName: \"kubernetes.io/projected/34f77ccb-223c-4aec-af9c-f1311dfd9100-kube-api-access-b7f8j\") pod \"coredns-7db6d8ff4d-4b7hx\" (UID: \"34f77ccb-223c-4aec-af9c-f1311dfd9100\") " pod="kube-system/coredns-7db6d8ff4d-4b7hx" May 10 00:44:39.536399 systemd[1]: Created slice kubepods-burstable-pod346b5d8f_193c_4fe4_b4b6_46de7f98db5b.slice. May 10 00:44:40.035923 kubelet[2528]: I0510 00:44:39.608521 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/5c5ae991-5c69-4151-badb-79442d925e88-calico-apiserver-certs\") pod \"calico-apiserver-6f6796fc67-z4mcn\" (UID: \"5c5ae991-5c69-4151-badb-79442d925e88\") " pod="calico-apiserver/calico-apiserver-6f6796fc67-z4mcn" May 10 00:44:40.035923 kubelet[2528]: I0510 00:44:39.608548 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/28042a2c-6cae-434f-a489-539111320f12-calico-apiserver-certs\") pod \"calico-apiserver-6f6796fc67-mfm9v\" (UID: \"28042a2c-6cae-434f-a489-539111320f12\") " pod="calico-apiserver/calico-apiserver-6f6796fc67-mfm9v" May 10 00:44:40.035923 kubelet[2528]: I0510 00:44:39.608625 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-frflg\" (UniqueName: \"kubernetes.io/projected/28042a2c-6cae-434f-a489-539111320f12-kube-api-access-frflg\") pod \"calico-apiserver-6f6796fc67-mfm9v\" (UID: \"28042a2c-6cae-434f-a489-539111320f12\") " pod="calico-apiserver/calico-apiserver-6f6796fc67-mfm9v" May 10 00:44:40.035923 kubelet[2528]: I0510 00:44:39.608661 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kgg2g\" (UniqueName: \"kubernetes.io/projected/5c5ae991-5c69-4151-badb-79442d925e88-kube-api-access-kgg2g\") pod \"calico-apiserver-6f6796fc67-z4mcn\" (UID: \"5c5ae991-5c69-4151-badb-79442d925e88\") " pod="calico-apiserver/calico-apiserver-6f6796fc67-z4mcn" May 10 00:44:40.035923 kubelet[2528]: I0510 00:44:39.608709 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/346b5d8f-193c-4fe4-b4b6-46de7f98db5b-config-volume\") pod \"coredns-7db6d8ff4d-w84t7\" (UID: \"346b5d8f-193c-4fe4-b4b6-46de7f98db5b\") " pod="kube-system/coredns-7db6d8ff4d-w84t7" May 10 00:44:39.554163 systemd[1]: Created slice kubepods-burstable-pod34f77ccb_223c_4aec_af9c_f1311dfd9100.slice. May 10 00:44:40.036461 kubelet[2528]: I0510 00:44:39.608735 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/283e0cc9-b0f3-4c21-b09c-2a9c6cb13ecb-tigera-ca-bundle\") pod \"calico-kube-controllers-d465f4dc7-tgv6g\" (UID: \"283e0cc9-b0f3-4c21-b09c-2a9c6cb13ecb\") " pod="calico-system/calico-kube-controllers-d465f4dc7-tgv6g" May 10 00:44:40.036461 kubelet[2528]: I0510 00:44:39.608787 2528 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9629r\" (UniqueName: \"kubernetes.io/projected/346b5d8f-193c-4fe4-b4b6-46de7f98db5b-kube-api-access-9629r\") pod \"coredns-7db6d8ff4d-w84t7\" (UID: \"346b5d8f-193c-4fe4-b4b6-46de7f98db5b\") " pod="kube-system/coredns-7db6d8ff4d-w84t7" May 10 00:44:39.567325 systemd[1]: Created slice kubepods-besteffort-pod28042a2c_6cae_434f_a489_539111320f12.slice. May 10 00:44:39.577237 systemd[1]: Created slice kubepods-besteffort-pod5c5ae991_5c69_4151_badb_79442d925e88.slice. May 10 00:44:39.591623 systemd[1]: Created slice kubepods-besteffort-pod283e0cc9_b0f3_4c21_b09c_2a9c6cb13ecb.slice. May 10 00:44:39.660710 systemd[1]: Created slice kubepods-besteffort-podc60a92a9_8c7e_46c2_9455_69880570e281.slice. May 10 00:44:40.039306 env[1417]: time="2025-05-10T00:44:40.038647850Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lqtwf,Uid:c60a92a9-8c7e-46c2-9455-69880570e281,Namespace:calico-system,Attempt:0,}" May 10 00:44:40.345286 env[1417]: time="2025-05-10T00:44:40.344651258Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-d465f4dc7-tgv6g,Uid:283e0cc9-b0f3-4c21-b09c-2a9c6cb13ecb,Namespace:calico-system,Attempt:0,}" May 10 00:44:40.345286 env[1417]: time="2025-05-10T00:44:40.344711059Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-4b7hx,Uid:34f77ccb-223c-4aec-af9c-f1311dfd9100,Namespace:kube-system,Attempt:0,}" May 10 00:44:40.345286 env[1417]: time="2025-05-10T00:44:40.344675258Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-w84t7,Uid:346b5d8f-193c-4fe4-b4b6-46de7f98db5b,Namespace:kube-system,Attempt:0,}" May 10 00:44:40.345896 env[1417]: time="2025-05-10T00:44:40.345847968Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6f6796fc67-mfm9v,Uid:28042a2c-6cae-434f-a489-539111320f12,Namespace:calico-apiserver,Attempt:0,}" May 10 00:44:40.382771 env[1417]: time="2025-05-10T00:44:40.382699870Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6f6796fc67-z4mcn,Uid:5c5ae991-5c69-4151-badb-79442d925e88,Namespace:calico-apiserver,Attempt:0,}" May 10 00:44:41.192052 env[1417]: time="2025-05-10T00:44:41.191984077Z" level=info msg="shim disconnected" id=0c1225882357e862a1436781763b9696c007fd912ad704e033aaed91595a5aff May 10 00:44:41.192052 env[1417]: time="2025-05-10T00:44:41.192051777Z" level=warning msg="cleaning up after shim disconnected" id=0c1225882357e862a1436781763b9696c007fd912ad704e033aaed91595a5aff namespace=k8s.io May 10 00:44:41.192052 env[1417]: time="2025-05-10T00:44:41.192063577Z" level=info msg="cleaning up dead shim" May 10 00:44:41.203292 env[1417]: time="2025-05-10T00:44:41.203206267Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:44:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3250 runtime=io.containerd.runc.v2\n" May 10 00:44:41.703620 env[1417]: time="2025-05-10T00:44:41.703509695Z" level=error msg="Failed to destroy network for sandbox \"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.704581 env[1417]: time="2025-05-10T00:44:41.704487803Z" level=error msg="encountered an error cleaning up failed sandbox \"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.705310 env[1417]: time="2025-05-10T00:44:41.705148809Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-4b7hx,Uid:34f77ccb-223c-4aec-af9c-f1311dfd9100,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.706866 kubelet[2528]: E0510 00:44:41.706782 2528 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.708623 kubelet[2528]: E0510 00:44:41.707281 2528 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-4b7hx" May 10 00:44:41.708623 kubelet[2528]: E0510 00:44:41.707506 2528 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-4b7hx" May 10 00:44:41.708623 kubelet[2528]: E0510 00:44:41.707859 2528 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-4b7hx_kube-system(34f77ccb-223c-4aec-af9c-f1311dfd9100)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-4b7hx_kube-system(34f77ccb-223c-4aec-af9c-f1311dfd9100)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-4b7hx" podUID="34f77ccb-223c-4aec-af9c-f1311dfd9100" May 10 00:44:41.737444 env[1417]: time="2025-05-10T00:44:41.737345268Z" level=error msg="Failed to destroy network for sandbox \"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.737924 env[1417]: time="2025-05-10T00:44:41.737867272Z" level=error msg="encountered an error cleaning up failed sandbox \"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.738103 env[1417]: time="2025-05-10T00:44:41.738061274Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lqtwf,Uid:c60a92a9-8c7e-46c2-9455-69880570e281,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.738546 kubelet[2528]: E0510 00:44:41.738401 2528 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.738546 kubelet[2528]: E0510 00:44:41.738510 2528 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-lqtwf" May 10 00:44:41.738546 kubelet[2528]: E0510 00:44:41.738541 2528 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-lqtwf" May 10 00:44:41.738771 kubelet[2528]: E0510 00:44:41.738600 2528 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-lqtwf_calico-system(c60a92a9-8c7e-46c2-9455-69880570e281)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-lqtwf_calico-system(c60a92a9-8c7e-46c2-9455-69880570e281)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-lqtwf" podUID="c60a92a9-8c7e-46c2-9455-69880570e281" May 10 00:44:41.741778 env[1417]: time="2025-05-10T00:44:41.741590002Z" level=error msg="Failed to destroy network for sandbox \"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.742381 env[1417]: time="2025-05-10T00:44:41.742232207Z" level=error msg="encountered an error cleaning up failed sandbox \"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.742583 env[1417]: time="2025-05-10T00:44:41.742430709Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-d465f4dc7-tgv6g,Uid:283e0cc9-b0f3-4c21-b09c-2a9c6cb13ecb,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.742991 kubelet[2528]: E0510 00:44:41.742942 2528 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.743156 kubelet[2528]: E0510 00:44:41.743028 2528 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-d465f4dc7-tgv6g" May 10 00:44:41.743156 kubelet[2528]: E0510 00:44:41.743057 2528 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-d465f4dc7-tgv6g" May 10 00:44:41.743324 kubelet[2528]: E0510 00:44:41.743178 2528 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-d465f4dc7-tgv6g_calico-system(283e0cc9-b0f3-4c21-b09c-2a9c6cb13ecb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-d465f4dc7-tgv6g_calico-system(283e0cc9-b0f3-4c21-b09c-2a9c6cb13ecb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-d465f4dc7-tgv6g" podUID="283e0cc9-b0f3-4c21-b09c-2a9c6cb13ecb" May 10 00:44:41.759120 env[1417]: time="2025-05-10T00:44:41.758908442Z" level=error msg="Failed to destroy network for sandbox \"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.760310 env[1417]: time="2025-05-10T00:44:41.759786249Z" level=error msg="encountered an error cleaning up failed sandbox \"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.760518 env[1417]: time="2025-05-10T00:44:41.760355053Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6f6796fc67-z4mcn,Uid:5c5ae991-5c69-4151-badb-79442d925e88,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.760813 kubelet[2528]: E0510 00:44:41.760732 2528 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.760929 kubelet[2528]: E0510 00:44:41.760874 2528 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6f6796fc67-z4mcn" May 10 00:44:41.760929 kubelet[2528]: E0510 00:44:41.760906 2528 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6f6796fc67-z4mcn" May 10 00:44:41.764387 kubelet[2528]: E0510 00:44:41.761456 2528 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6f6796fc67-z4mcn_calico-apiserver(5c5ae991-5c69-4151-badb-79442d925e88)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6f6796fc67-z4mcn_calico-apiserver(5c5ae991-5c69-4151-badb-79442d925e88)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6f6796fc67-z4mcn" podUID="5c5ae991-5c69-4151-badb-79442d925e88" May 10 00:44:41.782384 env[1417]: time="2025-05-10T00:44:41.782293330Z" level=error msg="Failed to destroy network for sandbox \"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.784706 env[1417]: time="2025-05-10T00:44:41.784615349Z" level=error msg="encountered an error cleaning up failed sandbox \"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.785165 env[1417]: time="2025-05-10T00:44:41.785093252Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-w84t7,Uid:346b5d8f-193c-4fe4-b4b6-46de7f98db5b,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.785719 kubelet[2528]: E0510 00:44:41.785654 2528 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.785851 kubelet[2528]: E0510 00:44:41.785764 2528 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-w84t7" May 10 00:44:41.785851 kubelet[2528]: E0510 00:44:41.785803 2528 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-w84t7" May 10 00:44:41.785964 kubelet[2528]: E0510 00:44:41.785884 2528 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-w84t7_kube-system(346b5d8f-193c-4fe4-b4b6-46de7f98db5b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-w84t7_kube-system(346b5d8f-193c-4fe4-b4b6-46de7f98db5b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-w84t7" podUID="346b5d8f-193c-4fe4-b4b6-46de7f98db5b" May 10 00:44:41.791734 env[1417]: time="2025-05-10T00:44:41.791529204Z" level=error msg="Failed to destroy network for sandbox \"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.792131 env[1417]: time="2025-05-10T00:44:41.792087909Z" level=error msg="encountered an error cleaning up failed sandbox \"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.792313 env[1417]: time="2025-05-10T00:44:41.792163709Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6f6796fc67-mfm9v,Uid:28042a2c-6cae-434f-a489-539111320f12,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.792610 kubelet[2528]: E0510 00:44:41.792558 2528 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:41.792724 kubelet[2528]: E0510 00:44:41.792642 2528 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6f6796fc67-mfm9v" May 10 00:44:41.792724 kubelet[2528]: E0510 00:44:41.792669 2528 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6f6796fc67-mfm9v" May 10 00:44:41.793163 kubelet[2528]: E0510 00:44:41.792754 2528 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6f6796fc67-mfm9v_calico-apiserver(28042a2c-6cae-434f-a489-539111320f12)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6f6796fc67-mfm9v_calico-apiserver(28042a2c-6cae-434f-a489-539111320f12)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6f6796fc67-mfm9v" podUID="28042a2c-6cae-434f-a489-539111320f12" May 10 00:44:41.821835 kubelet[2528]: I0510 00:44:41.821789 2528 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" May 10 00:44:41.824668 env[1417]: time="2025-05-10T00:44:41.823123659Z" level=info msg="StopPodSandbox for \"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\"" May 10 00:44:41.830606 kubelet[2528]: I0510 00:44:41.829658 2528 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" May 10 00:44:41.831409 env[1417]: time="2025-05-10T00:44:41.831351925Z" level=info msg="StopPodSandbox for \"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\"" May 10 00:44:41.839069 kubelet[2528]: I0510 00:44:41.836765 2528 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" May 10 00:44:41.844676 env[1417]: time="2025-05-10T00:44:41.842641116Z" level=info msg="StopPodSandbox for \"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\"" May 10 00:44:41.854605 kubelet[2528]: I0510 00:44:41.852313 2528 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" May 10 00:44:41.857655 env[1417]: time="2025-05-10T00:44:41.857596436Z" level=info msg="StopPodSandbox for \"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\"" May 10 00:44:41.879556 env[1417]: time="2025-05-10T00:44:41.874557073Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 10 00:44:41.885085 kubelet[2528]: I0510 00:44:41.884437 2528 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" May 10 00:44:41.885863 env[1417]: time="2025-05-10T00:44:41.885804363Z" level=info msg="StopPodSandbox for \"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\"" May 10 00:44:41.892372 kubelet[2528]: I0510 00:44:41.889232 2528 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" May 10 00:44:41.892929 env[1417]: time="2025-05-10T00:44:41.890149498Z" level=info msg="StopPodSandbox for \"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\"" May 10 00:44:42.045609 env[1417]: time="2025-05-10T00:44:42.042853622Z" level=error msg="StopPodSandbox for \"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\" failed" error="failed to destroy network for sandbox \"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:42.045852 kubelet[2528]: E0510 00:44:42.043170 2528 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" May 10 00:44:42.045852 kubelet[2528]: E0510 00:44:42.043521 2528 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918"} May 10 00:44:42.045852 kubelet[2528]: E0510 00:44:42.043616 2528 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"34f77ccb-223c-4aec-af9c-f1311dfd9100\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:44:42.045852 kubelet[2528]: E0510 00:44:42.043658 2528 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"34f77ccb-223c-4aec-af9c-f1311dfd9100\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-4b7hx" podUID="34f77ccb-223c-4aec-af9c-f1311dfd9100" May 10 00:44:42.057787 env[1417]: time="2025-05-10T00:44:42.057694840Z" level=error msg="StopPodSandbox for \"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\" failed" error="failed to destroy network for sandbox \"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:42.058082 kubelet[2528]: E0510 00:44:42.058032 2528 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" May 10 00:44:42.058206 kubelet[2528]: E0510 00:44:42.058100 2528 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273"} May 10 00:44:42.058206 kubelet[2528]: E0510 00:44:42.058156 2528 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"28042a2c-6cae-434f-a489-539111320f12\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:44:42.058415 kubelet[2528]: E0510 00:44:42.058194 2528 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"28042a2c-6cae-434f-a489-539111320f12\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6f6796fc67-mfm9v" podUID="28042a2c-6cae-434f-a489-539111320f12" May 10 00:44:42.083861 env[1417]: time="2025-05-10T00:44:42.083772946Z" level=error msg="StopPodSandbox for \"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\" failed" error="failed to destroy network for sandbox \"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:42.084834 kubelet[2528]: E0510 00:44:42.084776 2528 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" May 10 00:44:42.085370 kubelet[2528]: E0510 00:44:42.084854 2528 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65"} May 10 00:44:42.085370 kubelet[2528]: E0510 00:44:42.084909 2528 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"283e0cc9-b0f3-4c21-b09c-2a9c6cb13ecb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:44:42.085370 kubelet[2528]: E0510 00:44:42.084959 2528 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"283e0cc9-b0f3-4c21-b09c-2a9c6cb13ecb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-d465f4dc7-tgv6g" podUID="283e0cc9-b0f3-4c21-b09c-2a9c6cb13ecb" May 10 00:44:42.092449 env[1417]: time="2025-05-10T00:44:42.092363714Z" level=error msg="StopPodSandbox for \"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\" failed" error="failed to destroy network for sandbox \"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:42.092813 kubelet[2528]: E0510 00:44:42.092752 2528 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" May 10 00:44:42.092990 kubelet[2528]: E0510 00:44:42.092836 2528 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010"} May 10 00:44:42.092990 kubelet[2528]: E0510 00:44:42.092891 2528 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5c5ae991-5c69-4151-badb-79442d925e88\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:44:42.092990 kubelet[2528]: E0510 00:44:42.092926 2528 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5c5ae991-5c69-4151-badb-79442d925e88\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6f6796fc67-z4mcn" podUID="5c5ae991-5c69-4151-badb-79442d925e88" May 10 00:44:42.114492 env[1417]: time="2025-05-10T00:44:42.114415188Z" level=error msg="StopPodSandbox for \"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\" failed" error="failed to destroy network for sandbox \"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:42.114802 kubelet[2528]: E0510 00:44:42.114759 2528 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" May 10 00:44:42.114905 kubelet[2528]: E0510 00:44:42.114821 2528 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb"} May 10 00:44:42.114905 kubelet[2528]: E0510 00:44:42.114865 2528 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c60a92a9-8c7e-46c2-9455-69880570e281\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:44:42.115263 kubelet[2528]: E0510 00:44:42.114901 2528 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c60a92a9-8c7e-46c2-9455-69880570e281\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-lqtwf" podUID="c60a92a9-8c7e-46c2-9455-69880570e281" May 10 00:44:42.116086 env[1417]: time="2025-05-10T00:44:42.116014901Z" level=error msg="StopPodSandbox for \"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\" failed" error="failed to destroy network for sandbox \"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:44:42.116517 kubelet[2528]: E0510 00:44:42.116447 2528 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" May 10 00:44:42.116625 kubelet[2528]: E0510 00:44:42.116574 2528 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d"} May 10 00:44:42.116699 kubelet[2528]: E0510 00:44:42.116626 2528 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"346b5d8f-193c-4fe4-b4b6-46de7f98db5b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:44:42.116699 kubelet[2528]: E0510 00:44:42.116664 2528 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"346b5d8f-193c-4fe4-b4b6-46de7f98db5b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-w84t7" podUID="346b5d8f-193c-4fe4-b4b6-46de7f98db5b" May 10 00:44:42.336505 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273-shm.mount: Deactivated successfully. May 10 00:44:42.336631 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d-shm.mount: Deactivated successfully. May 10 00:44:42.336706 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918-shm.mount: Deactivated successfully. May 10 00:44:42.336784 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb-shm.mount: Deactivated successfully. May 10 00:44:42.336872 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65-shm.mount: Deactivated successfully. May 10 00:44:48.833313 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1883324294.mount: Deactivated successfully. May 10 00:44:48.908454 env[1417]: time="2025-05-10T00:44:48.908399991Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:48.918129 env[1417]: time="2025-05-10T00:44:48.918071061Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:48.924990 env[1417]: time="2025-05-10T00:44:48.924937810Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:48.931656 env[1417]: time="2025-05-10T00:44:48.931575757Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:48.935878 env[1417]: time="2025-05-10T00:44:48.934652979Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 10 00:44:48.963841 env[1417]: time="2025-05-10T00:44:48.963788388Z" level=info msg="CreateContainer within sandbox \"0ff1b40148e1d9a3211c8f1b871221280141bfaf567e31e8645742e03b20f1a6\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:44:49.017071 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2060683310.mount: Deactivated successfully. May 10 00:44:49.043955 env[1417]: time="2025-05-10T00:44:49.043888456Z" level=info msg="CreateContainer within sandbox \"0ff1b40148e1d9a3211c8f1b871221280141bfaf567e31e8645742e03b20f1a6\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"82ce7916b01a4e43bb5b528f1228da214814a19205c14597435f0ea4161db6d7\"" May 10 00:44:49.044833 env[1417]: time="2025-05-10T00:44:49.044650861Z" level=info msg="StartContainer for \"82ce7916b01a4e43bb5b528f1228da214814a19205c14597435f0ea4161db6d7\"" May 10 00:44:49.067624 systemd[1]: Started cri-containerd-82ce7916b01a4e43bb5b528f1228da214814a19205c14597435f0ea4161db6d7.scope. May 10 00:44:49.114819 kernel: kauditd_printk_skb: 34 callbacks suppressed May 10 00:44:49.115040 kernel: audit: type=1400 audit(1746837889.088:1012): avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.088000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.088000 audit[3583]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f6db071b2c8 items=0 ppid=2972 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:49.162304 kernel: audit: type=1300 audit(1746837889.088:1012): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f6db071b2c8 items=0 ppid=2972 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:49.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832636537393136623031613465343362623562353238663132323864 May 10 00:44:49.189297 kernel: audit: type=1327 audit(1746837889.088:1012): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832636537393136623031613465343362623562353238663132323864 May 10 00:44:49.088000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.208286 kernel: audit: type=1400 audit(1746837889.088:1013): avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.233407 kernel: audit: type=1400 audit(1746837889.088:1013): avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.088000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.088000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.273391 kernel: audit: type=1400 audit(1746837889.088:1013): avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.274735 env[1417]: time="2025-05-10T00:44:49.274663781Z" level=info msg="StartContainer for \"82ce7916b01a4e43bb5b528f1228da214814a19205c14597435f0ea4161db6d7\" returns successfully" May 10 00:44:49.088000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.319425 kernel: audit: type=1400 audit(1746837889.088:1013): avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.088000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.383433 kernel: audit: type=1400 audit(1746837889.088:1013): avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.088000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.469290 kernel: audit: type=1400 audit(1746837889.088:1013): avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.088000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.492286 kernel: audit: type=1400 audit(1746837889.088:1013): avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.088000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.088000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.088000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.088000 audit: BPF prog-id=137 op=LOAD May 10 00:44:49.088000 audit[3583]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000294208 items=0 ppid=2972 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:49.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832636537393136623031613465343362623562353238663132323864 May 10 00:44:49.113000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.113000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.113000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.113000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.113000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.113000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.113000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.113000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.113000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.113000 audit: BPF prog-id=138 op=LOAD May 10 00:44:49.113000 audit[3583]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000294258 items=0 ppid=2972 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:49.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832636537393136623031613465343362623562353238663132323864 May 10 00:44:49.114000 audit: BPF prog-id=138 op=UNLOAD May 10 00:44:49.114000 audit: BPF prog-id=137 op=UNLOAD May 10 00:44:49.114000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.114000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.114000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.114000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.114000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.114000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.114000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.114000 audit[3583]: AVC avc: denied { perfmon } for pid=3583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.114000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.114000 audit[3583]: AVC avc: denied { bpf } for pid=3583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:49.114000 audit: BPF prog-id=139 op=LOAD May 10 00:44:49.114000 audit[3583]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002942e8 items=0 ppid=2972 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:49.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832636537393136623031613465343362623562353238663132323864 May 10 00:44:49.782912 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 10 00:44:49.783116 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 10 00:44:49.958495 systemd[1]: run-containerd-runc-k8s.io-82ce7916b01a4e43bb5b528f1228da214814a19205c14597435f0ea4161db6d7-runc.iYvfGb.mount: Deactivated successfully. May 10 00:44:50.944123 systemd[1]: run-containerd-runc-k8s.io-82ce7916b01a4e43bb5b528f1228da214814a19205c14597435f0ea4161db6d7-runc.lBMsz1.mount: Deactivated successfully. May 10 00:44:51.369000 audit[3727]: AVC avc: denied { write } for pid=3727 comm="tee" name="fd" dev="proc" ino=30504 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:44:51.369000 audit[3727]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee863fa0c a2=241 a3=1b6 items=1 ppid=3705 pid=3727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.369000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:44:51.369000 audit: PATH item=0 name="/dev/fd/63" inode=29559 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:51.369000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:44:51.385000 audit[3732]: AVC avc: denied { write } for pid=3732 comm="tee" name="fd" dev="proc" ino=30510 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:44:51.385000 audit[3732]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb573ca0d a2=241 a3=1b6 items=1 ppid=3695 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.385000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:44:51.385000 audit: PATH item=0 name="/dev/fd/63" inode=30501 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:51.385000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:44:51.388000 audit[3737]: AVC avc: denied { write } for pid=3737 comm="tee" name="fd" dev="proc" ino=29578 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:44:51.388000 audit[3737]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9dbee9fc a2=241 a3=1b6 items=1 ppid=3701 pid=3737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.388000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:44:51.388000 audit: PATH item=0 name="/dev/fd/63" inode=29570 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:51.388000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:44:51.396000 audit[3747]: AVC avc: denied { write } for pid=3747 comm="tee" name="fd" dev="proc" ino=29584 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:44:51.396000 audit[3747]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9b7fba0c a2=241 a3=1b6 items=1 ppid=3707 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.396000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:44:51.396000 audit: PATH item=0 name="/dev/fd/63" inode=29574 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:51.396000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:44:51.416000 audit[3757]: AVC avc: denied { write } for pid=3757 comm="tee" name="fd" dev="proc" ino=29594 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:44:51.416000 audit[3757]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd011829fd a2=241 a3=1b6 items=1 ppid=3697 pid=3757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.416000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:44:51.416000 audit: PATH item=0 name="/dev/fd/63" inode=30512 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:51.416000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:44:51.422000 audit[3769]: AVC avc: denied { write } for pid=3769 comm="tee" name="fd" dev="proc" ino=29598 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:44:51.424000 audit[3771]: AVC avc: denied { write } for pid=3771 comm="tee" name="fd" dev="proc" ino=29601 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:44:51.422000 audit[3769]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd8e554a0c a2=241 a3=1b6 items=1 ppid=3703 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.422000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:44:51.422000 audit: PATH item=0 name="/dev/fd/63" inode=29589 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:51.422000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:44:51.424000 audit[3771]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0d736a0e a2=241 a3=1b6 items=1 ppid=3699 pid=3771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.424000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:44:51.424000 audit: PATH item=0 name="/dev/fd/63" inode=29591 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:51.424000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit: BPF prog-id=140 op=LOAD May 10 00:44:51.707000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff98937700 a2=98 a3=3 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.707000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.707000 audit: BPF prog-id=140 op=UNLOAD May 10 00:44:51.707000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit: BPF prog-id=141 op=LOAD May 10 00:44:51.707000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff989374e0 a2=74 a3=540051 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.707000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.707000 audit: BPF prog-id=141 op=UNLOAD May 10 00:44:51.707000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.707000 audit: BPF prog-id=142 op=LOAD May 10 00:44:51.707000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff98937510 a2=94 a3=2 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.707000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.708000 audit: BPF prog-id=142 op=UNLOAD May 10 00:44:51.828000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.828000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.828000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.828000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.828000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.828000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.828000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.828000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.828000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.828000 audit: BPF prog-id=143 op=LOAD May 10 00:44:51.828000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff989373d0 a2=40 a3=1 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.828000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.829000 audit: BPF prog-id=143 op=UNLOAD May 10 00:44:51.829000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.829000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff989374a0 a2=50 a3=7fff98937580 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.829000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.839000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff989373e0 a2=28 a3=0 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.839000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff98937410 a2=28 a3=0 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.839000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff98937320 a2=28 a3=0 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.839000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff98937430 a2=28 a3=0 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.839000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff98937410 a2=28 a3=0 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.839000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff98937400 a2=28 a3=0 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.839000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff98937430 a2=28 a3=0 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.839000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff98937410 a2=28 a3=0 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.839000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff98937430 a2=28 a3=0 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.839000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff98937400 a2=28 a3=0 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.839000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff98937470 a2=28 a3=0 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.839000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff98937220 a2=50 a3=1 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.839000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit: BPF prog-id=144 op=LOAD May 10 00:44:51.839000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff98937220 a2=94 a3=5 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.839000 audit: BPF prog-id=144 op=UNLOAD May 10 00:44:51.839000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff989372d0 a2=50 a3=1 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.839000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff989373f0 a2=4 a3=38 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.839000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.839000 audit[3806]: AVC avc: denied { confidentiality } for pid=3806 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:44:51.839000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff98937440 a2=94 a3=6 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.840000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.840000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.840000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.840000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.840000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.840000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.840000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.840000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.840000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.840000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.840000 audit[3806]: AVC avc: denied { confidentiality } for pid=3806 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:44:51.840000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff98936bf0 a2=94 a3=83 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.840000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.840000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.840000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.840000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.840000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.840000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.840000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.840000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.840000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.840000 audit[3806]: AVC avc: denied { perfmon } for pid=3806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.840000 audit[3806]: AVC avc: denied { bpf } for pid=3806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.840000 audit[3806]: AVC avc: denied { confidentiality } for pid=3806 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:44:51.840000 audit[3806]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff98936bf0 a2=94 a3=83 items=0 ppid=3706 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.840000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:44:51.853000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.853000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.853000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.853000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.853000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.853000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.853000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.853000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.853000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.853000 audit: BPF prog-id=145 op=LOAD May 10 00:44:51.853000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffa14d27d0 a2=98 a3=1999999999999999 items=0 ppid=3706 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.853000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:44:51.854000 audit: BPF prog-id=145 op=UNLOAD May 10 00:44:51.854000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.854000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.854000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.854000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.854000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.854000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.854000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.854000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.854000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.854000 audit: BPF prog-id=146 op=LOAD May 10 00:44:51.854000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffa14d26b0 a2=74 a3=ffff items=0 ppid=3706 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.854000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:44:51.854000 audit: BPF prog-id=146 op=UNLOAD May 10 00:44:51.854000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.854000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.854000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.854000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.854000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.854000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.854000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.854000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.854000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.854000 audit: BPF prog-id=147 op=LOAD May 10 00:44:51.854000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffa14d26f0 a2=40 a3=7fffa14d28d0 items=0 ppid=3706 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.854000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:44:51.854000 audit: BPF prog-id=147 op=UNLOAD May 10 00:44:51.953456 systemd-networkd[1571]: vxlan.calico: Link UP May 10 00:44:51.953474 systemd-networkd[1571]: vxlan.calico: Gained carrier May 10 00:44:51.977000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit: BPF prog-id=148 op=LOAD May 10 00:44:51.977000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff4173ff30 a2=98 a3=ffffffff items=0 ppid=3706 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.977000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:44:51.977000 audit: BPF prog-id=148 op=UNLOAD May 10 00:44:51.977000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit: BPF prog-id=149 op=LOAD May 10 00:44:51.977000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff4173fd40 a2=74 a3=540051 items=0 ppid=3706 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.977000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:44:51.977000 audit: BPF prog-id=149 op=UNLOAD May 10 00:44:51.977000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.977000 audit: BPF prog-id=150 op=LOAD May 10 00:44:51.977000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff4173fd70 a2=94 a3=2 items=0 ppid=3706 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.977000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:44:51.978000 audit: BPF prog-id=150 op=UNLOAD May 10 00:44:51.978000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.978000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff4173fc40 a2=28 a3=0 items=0 ppid=3706 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.978000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:44:51.978000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.978000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff4173fc70 a2=28 a3=0 items=0 ppid=3706 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.978000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:44:51.978000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.978000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff4173fb80 a2=28 a3=0 items=0 ppid=3706 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.978000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:44:51.978000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.978000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff4173fc90 a2=28 a3=0 items=0 ppid=3706 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.978000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:44:51.978000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.978000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff4173fc70 a2=28 a3=0 items=0 ppid=3706 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.978000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:44:51.978000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.978000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff4173fc60 a2=28 a3=0 items=0 ppid=3706 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.978000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:44:51.978000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.978000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff4173fc90 a2=28 a3=0 items=0 ppid=3706 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.978000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:44:51.978000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.978000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff4173fc70 a2=28 a3=0 items=0 ppid=3706 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.978000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:44:51.978000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.978000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff4173fc90 a2=28 a3=0 items=0 ppid=3706 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.978000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:44:51.979000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.979000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff4173fc60 a2=28 a3=0 items=0 ppid=3706 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.979000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:44:51.979000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.979000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff4173fcd0 a2=28 a3=0 items=0 ppid=3706 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.979000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:44:51.979000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.979000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.979000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.979000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.979000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.979000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.979000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.979000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.979000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.979000 audit: BPF prog-id=151 op=LOAD May 10 00:44:51.979000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff4173fb40 a2=40 a3=0 items=0 ppid=3706 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.979000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:44:51.979000 audit: BPF prog-id=151 op=UNLOAD May 10 00:44:51.980000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff4173fb30 a2=50 a3=2800 items=0 ppid=3706 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.980000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:44:51.980000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff4173fb30 a2=50 a3=2800 items=0 ppid=3706 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.980000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:44:51.980000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit: BPF prog-id=152 op=LOAD May 10 00:44:51.980000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff4173f350 a2=94 a3=2 items=0 ppid=3706 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.980000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:44:51.980000 audit: BPF prog-id=152 op=UNLOAD May 10 00:44:51.980000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.980000 audit: BPF prog-id=153 op=LOAD May 10 00:44:51.980000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff4173f450 a2=94 a3=30 items=0 ppid=3706 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.980000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:44:51.984000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.984000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.984000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.984000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.984000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.984000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.984000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.984000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.984000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.984000 audit: BPF prog-id=154 op=LOAD May 10 00:44:51.984000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd9bb1b880 a2=98 a3=0 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.984000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:51.984000 audit: BPF prog-id=154 op=UNLOAD May 10 00:44:51.985000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.985000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.985000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.985000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.985000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.985000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.985000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.985000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.985000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.985000 audit: BPF prog-id=155 op=LOAD May 10 00:44:51.985000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd9bb1b660 a2=74 a3=540051 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.985000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:51.985000 audit: BPF prog-id=155 op=UNLOAD May 10 00:44:51.985000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.985000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.985000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.985000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.985000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.985000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.985000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.985000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.985000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.985000 audit: BPF prog-id=156 op=LOAD May 10 00:44:51.985000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd9bb1b690 a2=94 a3=2 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.985000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:51.985000 audit: BPF prog-id=156 op=UNLOAD May 10 00:44:52.127000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.127000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.127000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.127000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.127000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.127000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.127000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.127000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.127000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.127000 audit: BPF prog-id=157 op=LOAD May 10 00:44:52.127000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd9bb1b550 a2=40 a3=1 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.127000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.127000 audit: BPF prog-id=157 op=UNLOAD May 10 00:44:52.127000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.127000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd9bb1b620 a2=50 a3=7ffd9bb1b700 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.127000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.137000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.137000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9bb1b560 a2=28 a3=0 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.137000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9bb1b590 a2=28 a3=0 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9bb1b4a0 a2=28 a3=0 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9bb1b5b0 a2=28 a3=0 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9bb1b590 a2=28 a3=0 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9bb1b580 a2=28 a3=0 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9bb1b5b0 a2=28 a3=0 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9bb1b590 a2=28 a3=0 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9bb1b5b0 a2=28 a3=0 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9bb1b580 a2=28 a3=0 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9bb1b5f0 a2=28 a3=0 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd9bb1b3a0 a2=50 a3=1 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit: BPF prog-id=158 op=LOAD May 10 00:44:52.138000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd9bb1b3a0 a2=94 a3=5 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.138000 audit: BPF prog-id=158 op=UNLOAD May 10 00:44:52.138000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd9bb1b450 a2=50 a3=1 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd9bb1b570 a2=4 a3=38 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.138000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:44:52.138000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd9bb1b5c0 a2=94 a3=6 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.139000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.139000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.139000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.139000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.139000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.139000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.139000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.139000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.139000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.139000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.139000 audit[3838]: AVC avc: denied { confidentiality } for pid=3838 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:44:52.139000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd9bb1ad70 a2=94 a3=83 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.139000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.139000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.139000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.139000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.139000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.139000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.139000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.139000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.139000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.139000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd9bb1ad70 a2=94 a3=83 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.139000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.139000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.139000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9bb1c7b0 a2=10 a3=f1f00800 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.139000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.140000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.140000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9bb1c650 a2=10 a3=3 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.140000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.140000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.140000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9bb1c5f0 a2=10 a3=3 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.140000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.140000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.140000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9bb1c5f0 a2=10 a3=7 items=0 ppid=3706 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.140000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:44:52.149000 audit: BPF prog-id=153 op=UNLOAD May 10 00:44:52.310000 audit[3866]: NETFILTER_CFG table=mangle:102 family=2 entries=16 op=nft_register_chain pid=3866 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:44:52.310000 audit[3866]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffde7e6ff0 a2=0 a3=7fffde7e6fdc items=0 ppid=3706 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.310000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:44:52.346000 audit[3865]: NETFILTER_CFG table=raw:103 family=2 entries=21 op=nft_register_chain pid=3865 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:44:52.346000 audit[3865]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff6a66fbe0 a2=0 a3=7fff6a66fbcc items=0 ppid=3706 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.346000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:44:52.351000 audit[3867]: NETFILTER_CFG table=nat:104 family=2 entries=15 op=nft_register_chain pid=3867 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:44:52.351000 audit[3867]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fffa018b880 a2=0 a3=7fffa018b86c items=0 ppid=3706 pid=3867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.351000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:44:52.364000 audit[3869]: NETFILTER_CFG table=filter:105 family=2 entries=39 op=nft_register_chain pid=3869 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:44:52.364000 audit[3869]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffcf6889fe0 a2=0 a3=7ffcf6889fcc items=0 ppid=3706 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.364000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:44:52.654759 env[1417]: time="2025-05-10T00:44:52.654692153Z" level=info msg="StopPodSandbox for \"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\"" May 10 00:44:52.712003 kubelet[2528]: I0510 00:44:52.711901 2528 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-q4vkg" podStartSLOduration=4.440031115 podStartE2EDuration="26.711849737s" podCreationTimestamp="2025-05-10 00:44:26 +0000 UTC" firstStartedPulling="2025-05-10 00:44:26.665678678 +0000 UTC m=+21.099605324" lastFinishedPulling="2025-05-10 00:44:48.9374973 +0000 UTC m=+43.371423946" observedRunningTime="2025-05-10 00:44:49.982861768 +0000 UTC m=+44.416788314" watchObservedRunningTime="2025-05-10 00:44:52.711849737 +0000 UTC m=+47.145776383" May 10 00:44:52.748993 env[1417]: 2025-05-10 00:44:52.713 [INFO][3894] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" May 10 00:44:52.748993 env[1417]: 2025-05-10 00:44:52.713 [INFO][3894] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" iface="eth0" netns="/var/run/netns/cni-fdebafe8-3d86-3b4b-cbc0-4cbf8607a354" May 10 00:44:52.748993 env[1417]: 2025-05-10 00:44:52.713 [INFO][3894] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" iface="eth0" netns="/var/run/netns/cni-fdebafe8-3d86-3b4b-cbc0-4cbf8607a354" May 10 00:44:52.748993 env[1417]: 2025-05-10 00:44:52.713 [INFO][3894] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" iface="eth0" netns="/var/run/netns/cni-fdebafe8-3d86-3b4b-cbc0-4cbf8607a354" May 10 00:44:52.748993 env[1417]: 2025-05-10 00:44:52.713 [INFO][3894] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" May 10 00:44:52.748993 env[1417]: 2025-05-10 00:44:52.713 [INFO][3894] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" May 10 00:44:52.748993 env[1417]: 2025-05-10 00:44:52.738 [INFO][3901] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" HandleID="k8s-pod-network.2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0" May 10 00:44:52.748993 env[1417]: 2025-05-10 00:44:52.738 [INFO][3901] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:52.748993 env[1417]: 2025-05-10 00:44:52.738 [INFO][3901] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:52.748993 env[1417]: 2025-05-10 00:44:52.744 [WARNING][3901] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" HandleID="k8s-pod-network.2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0" May 10 00:44:52.748993 env[1417]: 2025-05-10 00:44:52.744 [INFO][3901] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" HandleID="k8s-pod-network.2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0" May 10 00:44:52.748993 env[1417]: 2025-05-10 00:44:52.745 [INFO][3901] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:52.748993 env[1417]: 2025-05-10 00:44:52.747 [INFO][3894] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" May 10 00:44:52.752791 systemd[1]: run-netns-cni\x2dfdebafe8\x2d3d86\x2d3b4b\x2dcbc0\x2d4cbf8607a354.mount: Deactivated successfully. May 10 00:44:52.755140 env[1417]: time="2025-05-10T00:44:52.755064028Z" level=info msg="TearDown network for sandbox \"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\" successfully" May 10 00:44:52.755140 env[1417]: time="2025-05-10T00:44:52.755112328Z" level=info msg="StopPodSandbox for \"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\" returns successfully" May 10 00:44:52.756085 env[1417]: time="2025-05-10T00:44:52.756053534Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-w84t7,Uid:346b5d8f-193c-4fe4-b4b6-46de7f98db5b,Namespace:kube-system,Attempt:1,}" May 10 00:44:52.953046 systemd-networkd[1571]: calia31eec8f6ac: Link UP May 10 00:44:52.960424 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia31eec8f6ac: link becomes ready May 10 00:44:52.960845 systemd-networkd[1571]: calia31eec8f6ac: Gained carrier May 10 00:44:52.980892 env[1417]: 2025-05-10 00:44:52.849 [INFO][3908] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0 coredns-7db6d8ff4d- kube-system 346b5d8f-193c-4fe4-b4b6-46de7f98db5b 753 0 2025-05-10 00:44:19 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-d5b055839e coredns-7db6d8ff4d-w84t7 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia31eec8f6ac [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-w84t7" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-" May 10 00:44:52.980892 env[1417]: 2025-05-10 00:44:52.849 [INFO][3908] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-w84t7" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0" May 10 00:44:52.980892 env[1417]: 2025-05-10 00:44:52.890 [INFO][3922] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e" HandleID="k8s-pod-network.92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0" May 10 00:44:52.980892 env[1417]: 2025-05-10 00:44:52.902 [INFO][3922] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e" HandleID="k8s-pod-network.92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000291110), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-d5b055839e", "pod":"coredns-7db6d8ff4d-w84t7", "timestamp":"2025-05-10 00:44:52.890366438 +0000 UTC"}, Hostname:"ci-3510.3.7-n-d5b055839e", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:44:52.980892 env[1417]: 2025-05-10 00:44:52.903 [INFO][3922] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:52.980892 env[1417]: 2025-05-10 00:44:52.903 [INFO][3922] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:52.980892 env[1417]: 2025-05-10 00:44:52.903 [INFO][3922] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-d5b055839e' May 10 00:44:52.980892 env[1417]: 2025-05-10 00:44:52.909 [INFO][3922] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:52.980892 env[1417]: 2025-05-10 00:44:52.915 [INFO][3922] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-d5b055839e" May 10 00:44:52.980892 env[1417]: 2025-05-10 00:44:52.921 [INFO][3922] ipam/ipam.go 489: Trying affinity for 192.168.24.128/26 host="ci-3510.3.7-n-d5b055839e" May 10 00:44:52.980892 env[1417]: 2025-05-10 00:44:52.924 [INFO][3922] ipam/ipam.go 155: Attempting to load block cidr=192.168.24.128/26 host="ci-3510.3.7-n-d5b055839e" May 10 00:44:52.980892 env[1417]: 2025-05-10 00:44:52.927 [INFO][3922] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.24.128/26 host="ci-3510.3.7-n-d5b055839e" May 10 00:44:52.980892 env[1417]: 2025-05-10 00:44:52.927 [INFO][3922] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.24.128/26 handle="k8s-pod-network.92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:52.980892 env[1417]: 2025-05-10 00:44:52.930 [INFO][3922] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e May 10 00:44:52.980892 env[1417]: 2025-05-10 00:44:52.937 [INFO][3922] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.24.128/26 handle="k8s-pod-network.92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:52.980892 env[1417]: 2025-05-10 00:44:52.947 [INFO][3922] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.24.129/26] block=192.168.24.128/26 handle="k8s-pod-network.92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:52.980892 env[1417]: 2025-05-10 00:44:52.947 [INFO][3922] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.24.129/26] handle="k8s-pod-network.92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:52.980892 env[1417]: 2025-05-10 00:44:52.947 [INFO][3922] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:52.980892 env[1417]: 2025-05-10 00:44:52.947 [INFO][3922] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.24.129/26] IPv6=[] ContainerID="92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e" HandleID="k8s-pod-network.92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0" May 10 00:44:52.981893 env[1417]: 2025-05-10 00:44:52.949 [INFO][3908] cni-plugin/k8s.go 386: Populated endpoint ContainerID="92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-w84t7" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"346b5d8f-193c-4fe4-b4b6-46de7f98db5b", ResourceVersion:"753", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"", Pod:"coredns-7db6d8ff4d-w84t7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.24.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia31eec8f6ac", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:52.981893 env[1417]: 2025-05-10 00:44:52.949 [INFO][3908] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.24.129/32] ContainerID="92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-w84t7" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0" May 10 00:44:52.981893 env[1417]: 2025-05-10 00:44:52.949 [INFO][3908] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia31eec8f6ac ContainerID="92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-w84t7" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0" May 10 00:44:52.981893 env[1417]: 2025-05-10 00:44:52.951 [INFO][3908] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-w84t7" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0" May 10 00:44:52.981893 env[1417]: 2025-05-10 00:44:52.961 [INFO][3908] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-w84t7" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"346b5d8f-193c-4fe4-b4b6-46de7f98db5b", ResourceVersion:"753", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e", Pod:"coredns-7db6d8ff4d-w84t7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.24.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia31eec8f6ac", MAC:"92:4e:25:27:0f:58", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:52.981893 env[1417]: 2025-05-10 00:44:52.978 [INFO][3908] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-w84t7" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0" May 10 00:44:53.003164 env[1417]: time="2025-05-10T00:44:53.003052595Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:53.003164 env[1417]: time="2025-05-10T00:44:53.003119396Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:53.003164 env[1417]: time="2025-05-10T00:44:53.003134996Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:53.003668 env[1417]: time="2025-05-10T00:44:53.003610599Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e pid=3950 runtime=io.containerd.runc.v2 May 10 00:44:53.014000 audit[3945]: NETFILTER_CFG table=filter:106 family=2 entries=34 op=nft_register_chain pid=3945 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:44:53.014000 audit[3945]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fffa7ef9320 a2=0 a3=7fffa7ef930c items=0 ppid=3706 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.014000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:44:53.030832 systemd[1]: Started cri-containerd-92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e.scope. May 10 00:44:53.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.049000 audit: BPF prog-id=159 op=LOAD May 10 00:44:53.049000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.049000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3950 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932616333363530376230613039643839346462343839663231383336 May 10 00:44:53.049000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.049000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3950 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932616333363530376230613039643839346462343839663231383336 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit: BPF prog-id=160 op=LOAD May 10 00:44:53.050000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00034dce0 items=0 ppid=3950 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932616333363530376230613039643839346462343839663231383336 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit: BPF prog-id=161 op=LOAD May 10 00:44:53.050000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00034dd28 items=0 ppid=3950 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932616333363530376230613039643839346462343839663231383336 May 10 00:44:53.050000 audit: BPF prog-id=161 op=UNLOAD May 10 00:44:53.050000 audit: BPF prog-id=160 op=UNLOAD May 10 00:44:53.050000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.050000 audit: BPF prog-id=162 op=LOAD May 10 00:44:53.050000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003ce138 items=0 ppid=3950 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932616333363530376230613039643839346462343839663231383336 May 10 00:44:53.082289 env[1417]: time="2025-05-10T00:44:53.081642616Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-w84t7,Uid:346b5d8f-193c-4fe4-b4b6-46de7f98db5b,Namespace:kube-system,Attempt:1,} returns sandbox id \"92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e\"" May 10 00:44:53.085986 env[1417]: time="2025-05-10T00:44:53.085921344Z" level=info msg="CreateContainer within sandbox \"92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:44:53.127906 env[1417]: time="2025-05-10T00:44:53.127834122Z" level=info msg="CreateContainer within sandbox \"92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"adc90ee603a87a4422296d271816d1ef74d17b900c4d1e847ece2a82430edef7\"" May 10 00:44:53.128766 env[1417]: time="2025-05-10T00:44:53.128703528Z" level=info msg="StartContainer for \"adc90ee603a87a4422296d271816d1ef74d17b900c4d1e847ece2a82430edef7\"" May 10 00:44:53.147230 systemd[1]: Started cri-containerd-adc90ee603a87a4422296d271816d1ef74d17b900c4d1e847ece2a82430edef7.scope. May 10 00:44:53.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.162000 audit: BPF prog-id=163 op=LOAD May 10 00:44:53.163000 audit[3989]: AVC avc: denied { bpf } for pid=3989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.163000 audit[3989]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3950 pid=3989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164633930656536303361383761343432323239366432373138313664 May 10 00:44:53.163000 audit[3989]: AVC avc: denied { perfmon } for pid=3989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.163000 audit[3989]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3950 pid=3989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164633930656536303361383761343432323239366432373138313664 May 10 00:44:53.163000 audit[3989]: AVC avc: denied { bpf } for pid=3989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.163000 audit[3989]: AVC avc: denied { bpf } for pid=3989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.163000 audit[3989]: AVC avc: denied { bpf } for pid=3989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.163000 audit[3989]: AVC avc: denied { perfmon } for pid=3989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.163000 audit[3989]: AVC avc: denied { perfmon } for pid=3989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.163000 audit[3989]: AVC avc: denied { perfmon } for pid=3989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.163000 audit[3989]: AVC avc: denied { perfmon } for pid=3989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.163000 audit[3989]: AVC avc: denied { perfmon } for pid=3989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.163000 audit[3989]: AVC avc: denied { bpf } for pid=3989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.163000 audit[3989]: AVC avc: denied { bpf } for pid=3989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.163000 audit: BPF prog-id=164 op=LOAD May 10 00:44:53.163000 audit[3989]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000189f70 items=0 ppid=3950 pid=3989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164633930656536303361383761343432323239366432373138313664 May 10 00:44:53.164000 audit[3989]: AVC avc: denied { bpf } for pid=3989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.164000 audit[3989]: AVC avc: denied { bpf } for pid=3989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.164000 audit[3989]: AVC avc: denied { perfmon } for pid=3989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.164000 audit[3989]: AVC avc: denied { perfmon } for pid=3989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.164000 audit[3989]: AVC avc: denied { perfmon } for pid=3989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.164000 audit[3989]: AVC avc: denied { perfmon } for pid=3989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.164000 audit[3989]: AVC avc: denied { perfmon } for pid=3989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.164000 audit[3989]: AVC avc: denied { bpf } for pid=3989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.164000 audit[3989]: AVC avc: denied { bpf } for pid=3989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.164000 audit: BPF prog-id=165 op=LOAD May 10 00:44:53.164000 audit[3989]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000189fb8 items=0 ppid=3950 pid=3989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164633930656536303361383761343432323239366432373138313664 May 10 00:44:53.165000 audit: BPF prog-id=165 op=UNLOAD May 10 00:44:53.165000 audit: BPF prog-id=164 op=UNLOAD May 10 00:44:53.165000 audit[3989]: AVC avc: denied { bpf } for pid=3989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.165000 audit[3989]: AVC avc: denied { bpf } for pid=3989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.165000 audit[3989]: AVC avc: denied { bpf } for pid=3989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.165000 audit[3989]: AVC avc: denied { perfmon } for pid=3989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.165000 audit[3989]: AVC avc: denied { perfmon } for pid=3989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.165000 audit[3989]: AVC avc: denied { perfmon } for pid=3989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.165000 audit[3989]: AVC avc: denied { perfmon } for pid=3989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.165000 audit[3989]: AVC avc: denied { perfmon } for pid=3989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.165000 audit[3989]: AVC avc: denied { bpf } for pid=3989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.165000 audit[3989]: AVC avc: denied { bpf } for pid=3989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:53.165000 audit: BPF prog-id=166 op=LOAD May 10 00:44:53.165000 audit[3989]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001ba3c8 items=0 ppid=3950 pid=3989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164633930656536303361383761343432323239366432373138313664 May 10 00:44:53.185111 env[1417]: time="2025-05-10T00:44:53.185023601Z" level=info msg="StartContainer for \"adc90ee603a87a4422296d271816d1ef74d17b900c4d1e847ece2a82430edef7\" returns successfully" May 10 00:44:53.654743 env[1417]: time="2025-05-10T00:44:53.654695013Z" level=info msg="StopPodSandbox for \"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\"" May 10 00:44:53.698486 systemd-networkd[1571]: vxlan.calico: Gained IPv6LL May 10 00:44:53.745782 env[1417]: 2025-05-10 00:44:53.706 [INFO][4035] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" May 10 00:44:53.745782 env[1417]: 2025-05-10 00:44:53.707 [INFO][4035] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" iface="eth0" netns="/var/run/netns/cni-7e56c07f-db19-8467-1caf-82f42cb7bb0b" May 10 00:44:53.745782 env[1417]: 2025-05-10 00:44:53.707 [INFO][4035] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" iface="eth0" netns="/var/run/netns/cni-7e56c07f-db19-8467-1caf-82f42cb7bb0b" May 10 00:44:53.745782 env[1417]: 2025-05-10 00:44:53.707 [INFO][4035] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" iface="eth0" netns="/var/run/netns/cni-7e56c07f-db19-8467-1caf-82f42cb7bb0b" May 10 00:44:53.745782 env[1417]: 2025-05-10 00:44:53.707 [INFO][4035] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" May 10 00:44:53.745782 env[1417]: 2025-05-10 00:44:53.707 [INFO][4035] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" May 10 00:44:53.745782 env[1417]: 2025-05-10 00:44:53.735 [INFO][4043] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" HandleID="k8s-pod-network.46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" Workload="ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0" May 10 00:44:53.745782 env[1417]: 2025-05-10 00:44:53.735 [INFO][4043] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:53.745782 env[1417]: 2025-05-10 00:44:53.736 [INFO][4043] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:53.745782 env[1417]: 2025-05-10 00:44:53.741 [WARNING][4043] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" HandleID="k8s-pod-network.46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" Workload="ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0" May 10 00:44:53.745782 env[1417]: 2025-05-10 00:44:53.741 [INFO][4043] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" HandleID="k8s-pod-network.46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" Workload="ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0" May 10 00:44:53.745782 env[1417]: 2025-05-10 00:44:53.743 [INFO][4043] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:53.745782 env[1417]: 2025-05-10 00:44:53.744 [INFO][4035] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" May 10 00:44:53.746715 env[1417]: time="2025-05-10T00:44:53.745948517Z" level=info msg="TearDown network for sandbox \"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\" successfully" May 10 00:44:53.746715 env[1417]: time="2025-05-10T00:44:53.745994318Z" level=info msg="StopPodSandbox for \"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\" returns successfully" May 10 00:44:53.746888 env[1417]: time="2025-05-10T00:44:53.746853923Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lqtwf,Uid:c60a92a9-8c7e-46c2-9455-69880570e281,Namespace:calico-system,Attempt:1,}" May 10 00:44:53.758855 systemd[1]: run-netns-cni\x2d7e56c07f\x2ddb19\x2d8467\x2d1caf\x2d82f42cb7bb0b.mount: Deactivated successfully. May 10 00:44:53.953944 systemd-networkd[1571]: calie57eaec5849: Link UP May 10 00:44:53.965440 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:44:53.975335 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie57eaec5849: link becomes ready May 10 00:44:53.982555 systemd-networkd[1571]: calie57eaec5849: Gained carrier May 10 00:44:53.986000 audit[4071]: NETFILTER_CFG table=filter:107 family=2 entries=16 op=nft_register_rule pid=4071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:53.986000 audit[4071]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe2aa65eb0 a2=0 a3=7ffe2aa65e9c items=0 ppid=2685 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.986000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:53.991000 audit[4071]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=4071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:53.991000 audit[4071]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe2aa65eb0 a2=0 a3=0 items=0 ppid=2685 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.991000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:53.998289 kubelet[2528]: I0510 00:44:53.998193 2528 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-w84t7" podStartSLOduration=34.998151488 podStartE2EDuration="34.998151488s" podCreationTimestamp="2025-05-10 00:44:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:44:53.95161718 +0000 UTC m=+48.385543726" watchObservedRunningTime="2025-05-10 00:44:53.998151488 +0000 UTC m=+48.432078034" May 10 00:44:54.006101 env[1417]: 2025-05-10 00:44:53.860 [INFO][4050] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0 csi-node-driver- calico-system c60a92a9-8c7e-46c2-9455-69880570e281 764 0 2025-05-10 00:44:26 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.7-n-d5b055839e csi-node-driver-lqtwf eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calie57eaec5849 [] []}} ContainerID="e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c" Namespace="calico-system" Pod="csi-node-driver-lqtwf" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-" May 10 00:44:54.006101 env[1417]: 2025-05-10 00:44:53.860 [INFO][4050] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c" Namespace="calico-system" Pod="csi-node-driver-lqtwf" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0" May 10 00:44:54.006101 env[1417]: 2025-05-10 00:44:53.890 [INFO][4062] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c" HandleID="k8s-pod-network.e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c" Workload="ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0" May 10 00:44:54.006101 env[1417]: 2025-05-10 00:44:53.901 [INFO][4062] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c" HandleID="k8s-pod-network.e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c" Workload="ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002eeea0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-d5b055839e", "pod":"csi-node-driver-lqtwf", "timestamp":"2025-05-10 00:44:53.890779877 +0000 UTC"}, Hostname:"ci-3510.3.7-n-d5b055839e", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:44:54.006101 env[1417]: 2025-05-10 00:44:53.901 [INFO][4062] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:54.006101 env[1417]: 2025-05-10 00:44:53.901 [INFO][4062] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:54.006101 env[1417]: 2025-05-10 00:44:53.901 [INFO][4062] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-d5b055839e' May 10 00:44:54.006101 env[1417]: 2025-05-10 00:44:53.903 [INFO][4062] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:54.006101 env[1417]: 2025-05-10 00:44:53.907 [INFO][4062] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-d5b055839e" May 10 00:44:54.006101 env[1417]: 2025-05-10 00:44:53.911 [INFO][4062] ipam/ipam.go 489: Trying affinity for 192.168.24.128/26 host="ci-3510.3.7-n-d5b055839e" May 10 00:44:54.006101 env[1417]: 2025-05-10 00:44:53.913 [INFO][4062] ipam/ipam.go 155: Attempting to load block cidr=192.168.24.128/26 host="ci-3510.3.7-n-d5b055839e" May 10 00:44:54.006101 env[1417]: 2025-05-10 00:44:53.916 [INFO][4062] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.24.128/26 host="ci-3510.3.7-n-d5b055839e" May 10 00:44:54.006101 env[1417]: 2025-05-10 00:44:53.916 [INFO][4062] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.24.128/26 handle="k8s-pod-network.e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:54.006101 env[1417]: 2025-05-10 00:44:53.917 [INFO][4062] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c May 10 00:44:54.006101 env[1417]: 2025-05-10 00:44:53.928 [INFO][4062] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.24.128/26 handle="k8s-pod-network.e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:54.006101 env[1417]: 2025-05-10 00:44:53.942 [INFO][4062] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.24.130/26] block=192.168.24.128/26 handle="k8s-pod-network.e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:54.006101 env[1417]: 2025-05-10 00:44:53.942 [INFO][4062] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.24.130/26] handle="k8s-pod-network.e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:54.006101 env[1417]: 2025-05-10 00:44:53.942 [INFO][4062] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:54.006101 env[1417]: 2025-05-10 00:44:53.943 [INFO][4062] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.24.130/26] IPv6=[] ContainerID="e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c" HandleID="k8s-pod-network.e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c" Workload="ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0" May 10 00:44:54.007109 env[1417]: 2025-05-10 00:44:53.945 [INFO][4050] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c" Namespace="calico-system" Pod="csi-node-driver-lqtwf" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c60a92a9-8c7e-46c2-9455-69880570e281", ResourceVersion:"764", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"", Pod:"csi-node-driver-lqtwf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.24.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie57eaec5849", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:54.007109 env[1417]: 2025-05-10 00:44:53.945 [INFO][4050] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.24.130/32] ContainerID="e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c" Namespace="calico-system" Pod="csi-node-driver-lqtwf" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0" May 10 00:44:54.007109 env[1417]: 2025-05-10 00:44:53.945 [INFO][4050] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie57eaec5849 ContainerID="e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c" Namespace="calico-system" Pod="csi-node-driver-lqtwf" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0" May 10 00:44:54.007109 env[1417]: 2025-05-10 00:44:53.984 [INFO][4050] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c" Namespace="calico-system" Pod="csi-node-driver-lqtwf" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0" May 10 00:44:54.007109 env[1417]: 2025-05-10 00:44:53.984 [INFO][4050] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c" Namespace="calico-system" Pod="csi-node-driver-lqtwf" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c60a92a9-8c7e-46c2-9455-69880570e281", ResourceVersion:"764", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c", Pod:"csi-node-driver-lqtwf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.24.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie57eaec5849", MAC:"ee:86:12:97:16:9c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:54.007109 env[1417]: 2025-05-10 00:44:54.004 [INFO][4050] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c" Namespace="calico-system" Pod="csi-node-driver-lqtwf" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0" May 10 00:44:54.028000 audit[4084]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=4084 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:54.028000 audit[4084]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdcf859340 a2=0 a3=7ffdcf85932c items=0 ppid=2685 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:54.028000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:54.036000 audit[4084]: NETFILTER_CFG table=nat:110 family=2 entries=35 op=nft_register_chain pid=4084 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:54.036000 audit[4084]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffdcf859340 a2=0 a3=7ffdcf85932c items=0 ppid=2685 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:54.036000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:54.040285 env[1417]: time="2025-05-10T00:44:54.040191363Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:54.040450 env[1417]: time="2025-05-10T00:44:54.040283664Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:54.040450 env[1417]: time="2025-05-10T00:44:54.040300664Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:54.040618 env[1417]: time="2025-05-10T00:44:54.040497365Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c pid=4091 runtime=io.containerd.runc.v2 May 10 00:44:54.058000 audit[4104]: NETFILTER_CFG table=filter:111 family=2 entries=38 op=nft_register_chain pid=4104 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:44:54.058000 audit[4104]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fff1e5cefa0 a2=0 a3=7fff1e5cef8c items=0 ppid=3706 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:54.058000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:44:54.078722 systemd[1]: Started cri-containerd-e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c.scope. May 10 00:44:54.114812 kernel: kauditd_printk_skb: 686 callbacks suppressed May 10 00:44:54.115453 kernel: audit: type=1400 audit(1746837894.088:1162): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.141720 kernel: audit: type=1400 audit(1746837894.088:1163): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.141896 kernel: audit: type=1400 audit(1746837894.088:1164): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.158449 kernel: audit: type=1400 audit(1746837894.088:1165): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.175102 env[1417]: time="2025-05-10T00:44:54.172718829Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lqtwf,Uid:c60a92a9-8c7e-46c2-9455-69880570e281,Namespace:calico-system,Attempt:1,} returns sandbox id \"e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c\"" May 10 00:44:54.175266 kernel: audit: type=1400 audit(1746837894.088:1166): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.178502 env[1417]: time="2025-05-10T00:44:54.177038157Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 10 00:44:54.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.218670 kernel: audit: type=1400 audit(1746837894.088:1167): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.218833 kernel: audit: type=1400 audit(1746837894.088:1168): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.228972 kernel: audit: type=1400 audit(1746837894.088:1169): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.219179 systemd-networkd[1571]: calia31eec8f6ac: Gained IPv6LL May 10 00:44:54.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.292790 kernel: audit: type=1400 audit(1746837894.088:1170): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.292941 kernel: audit: type=1400 audit(1746837894.089:1171): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.089000 audit: BPF prog-id=167 op=LOAD May 10 00:44:54.089000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.089000 audit[4102]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4091 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:54.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537373734346563393865343866396366346564633138653734326430 May 10 00:44:54.089000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.089000 audit[4102]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4091 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:54.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537373734346563393865343866396366346564633138653734326430 May 10 00:44:54.089000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.089000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.089000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.089000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.089000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.089000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.089000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.089000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.089000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.089000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.089000 audit: BPF prog-id=168 op=LOAD May 10 00:44:54.089000 audit[4102]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e0e90 items=0 ppid=4091 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:54.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537373734346563393865343866396366346564633138653734326430 May 10 00:44:54.112000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.112000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.112000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.112000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.112000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.112000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.112000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.112000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.112000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.112000 audit: BPF prog-id=169 op=LOAD May 10 00:44:54.112000 audit[4102]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000252d8 items=0 ppid=4091 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:54.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537373734346563393865343866396366346564633138653734326430 May 10 00:44:54.112000 audit: BPF prog-id=169 op=UNLOAD May 10 00:44:54.112000 audit: BPF prog-id=168 op=UNLOAD May 10 00:44:54.112000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.112000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.112000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.112000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.112000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.112000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.112000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.112000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.112000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.112000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:54.112000 audit: BPF prog-id=170 op=LOAD May 10 00:44:54.112000 audit[4102]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000256e8 items=0 ppid=4091 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:54.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537373734346563393865343866396366346564633138653734326430 May 10 00:44:54.753568 systemd[1]: run-containerd-runc-k8s.io-e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c-runc.05CG3U.mount: Deactivated successfully. May 10 00:44:55.655705 env[1417]: time="2025-05-10T00:44:55.655653051Z" level=info msg="StopPodSandbox for \"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\"" May 10 00:44:55.746653 systemd-networkd[1571]: calie57eaec5849: Gained IPv6LL May 10 00:44:55.769389 env[1417]: 2025-05-10 00:44:55.725 [INFO][4140] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" May 10 00:44:55.769389 env[1417]: 2025-05-10 00:44:55.725 [INFO][4140] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" iface="eth0" netns="/var/run/netns/cni-8574b8bc-513a-3ea6-8b15-528a4cdb031e" May 10 00:44:55.769389 env[1417]: 2025-05-10 00:44:55.725 [INFO][4140] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" iface="eth0" netns="/var/run/netns/cni-8574b8bc-513a-3ea6-8b15-528a4cdb031e" May 10 00:44:55.769389 env[1417]: 2025-05-10 00:44:55.725 [INFO][4140] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" iface="eth0" netns="/var/run/netns/cni-8574b8bc-513a-3ea6-8b15-528a4cdb031e" May 10 00:44:55.769389 env[1417]: 2025-05-10 00:44:55.725 [INFO][4140] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" May 10 00:44:55.769389 env[1417]: 2025-05-10 00:44:55.725 [INFO][4140] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" May 10 00:44:55.769389 env[1417]: 2025-05-10 00:44:55.759 [INFO][4148] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" HandleID="k8s-pod-network.cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0" May 10 00:44:55.769389 env[1417]: 2025-05-10 00:44:55.759 [INFO][4148] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:55.769389 env[1417]: 2025-05-10 00:44:55.760 [INFO][4148] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:55.769389 env[1417]: 2025-05-10 00:44:55.765 [WARNING][4148] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" HandleID="k8s-pod-network.cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0" May 10 00:44:55.769389 env[1417]: 2025-05-10 00:44:55.765 [INFO][4148] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" HandleID="k8s-pod-network.cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0" May 10 00:44:55.769389 env[1417]: 2025-05-10 00:44:55.767 [INFO][4148] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:55.769389 env[1417]: 2025-05-10 00:44:55.768 [INFO][4140] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" May 10 00:44:55.776207 systemd[1]: run-netns-cni\x2d8574b8bc\x2d513a\x2d3ea6\x2d8b15\x2d528a4cdb031e.mount: Deactivated successfully. May 10 00:44:55.777866 env[1417]: time="2025-05-10T00:44:55.777810237Z" level=info msg="TearDown network for sandbox \"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\" successfully" May 10 00:44:55.778000 env[1417]: time="2025-05-10T00:44:55.777873337Z" level=info msg="StopPodSandbox for \"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\" returns successfully" May 10 00:44:55.778751 env[1417]: time="2025-05-10T00:44:55.778715143Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6f6796fc67-z4mcn,Uid:5c5ae991-5c69-4151-badb-79442d925e88,Namespace:calico-apiserver,Attempt:1,}" May 10 00:44:56.052786 systemd-networkd[1571]: cali4f8ebb2009d: Link UP May 10 00:44:56.062354 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:44:56.071837 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4f8ebb2009d: link becomes ready May 10 00:44:56.073860 systemd-networkd[1571]: cali4f8ebb2009d: Gained carrier May 10 00:44:56.093914 env[1417]: 2025-05-10 00:44:55.943 [INFO][4155] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0 calico-apiserver-6f6796fc67- calico-apiserver 5c5ae991-5c69-4151-badb-79442d925e88 783 0 2025-05-10 00:44:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6f6796fc67 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-d5b055839e calico-apiserver-6f6796fc67-z4mcn eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali4f8ebb2009d [] []}} ContainerID="e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3" Namespace="calico-apiserver" Pod="calico-apiserver-6f6796fc67-z4mcn" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-" May 10 00:44:56.093914 env[1417]: 2025-05-10 00:44:55.943 [INFO][4155] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3" Namespace="calico-apiserver" Pod="calico-apiserver-6f6796fc67-z4mcn" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0" May 10 00:44:56.093914 env[1417]: 2025-05-10 00:44:55.994 [INFO][4167] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3" HandleID="k8s-pod-network.e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0" May 10 00:44:56.093914 env[1417]: 2025-05-10 00:44:56.004 [INFO][4167] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3" HandleID="k8s-pod-network.e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029ef60), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-d5b055839e", "pod":"calico-apiserver-6f6796fc67-z4mcn", "timestamp":"2025-05-10 00:44:55.994941534 +0000 UTC"}, Hostname:"ci-3510.3.7-n-d5b055839e", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:44:56.093914 env[1417]: 2025-05-10 00:44:56.005 [INFO][4167] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:56.093914 env[1417]: 2025-05-10 00:44:56.005 [INFO][4167] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:56.093914 env[1417]: 2025-05-10 00:44:56.005 [INFO][4167] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-d5b055839e' May 10 00:44:56.093914 env[1417]: 2025-05-10 00:44:56.007 [INFO][4167] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:56.093914 env[1417]: 2025-05-10 00:44:56.011 [INFO][4167] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-d5b055839e" May 10 00:44:56.093914 env[1417]: 2025-05-10 00:44:56.015 [INFO][4167] ipam/ipam.go 489: Trying affinity for 192.168.24.128/26 host="ci-3510.3.7-n-d5b055839e" May 10 00:44:56.093914 env[1417]: 2025-05-10 00:44:56.017 [INFO][4167] ipam/ipam.go 155: Attempting to load block cidr=192.168.24.128/26 host="ci-3510.3.7-n-d5b055839e" May 10 00:44:56.093914 env[1417]: 2025-05-10 00:44:56.019 [INFO][4167] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.24.128/26 host="ci-3510.3.7-n-d5b055839e" May 10 00:44:56.093914 env[1417]: 2025-05-10 00:44:56.019 [INFO][4167] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.24.128/26 handle="k8s-pod-network.e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:56.093914 env[1417]: 2025-05-10 00:44:56.021 [INFO][4167] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3 May 10 00:44:56.093914 env[1417]: 2025-05-10 00:44:56.028 [INFO][4167] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.24.128/26 handle="k8s-pod-network.e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:56.093914 env[1417]: 2025-05-10 00:44:56.039 [INFO][4167] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.24.131/26] block=192.168.24.128/26 handle="k8s-pod-network.e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:56.093914 env[1417]: 2025-05-10 00:44:56.040 [INFO][4167] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.24.131/26] handle="k8s-pod-network.e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:56.093914 env[1417]: 2025-05-10 00:44:56.040 [INFO][4167] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:56.093914 env[1417]: 2025-05-10 00:44:56.040 [INFO][4167] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.24.131/26] IPv6=[] ContainerID="e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3" HandleID="k8s-pod-network.e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0" May 10 00:44:56.095082 env[1417]: 2025-05-10 00:44:56.042 [INFO][4155] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3" Namespace="calico-apiserver" Pod="calico-apiserver-6f6796fc67-z4mcn" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0", GenerateName:"calico-apiserver-6f6796fc67-", Namespace:"calico-apiserver", SelfLink:"", UID:"5c5ae991-5c69-4151-badb-79442d925e88", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6f6796fc67", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"", Pod:"calico-apiserver-6f6796fc67-z4mcn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.24.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4f8ebb2009d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:56.095082 env[1417]: 2025-05-10 00:44:56.042 [INFO][4155] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.24.131/32] ContainerID="e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3" Namespace="calico-apiserver" Pod="calico-apiserver-6f6796fc67-z4mcn" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0" May 10 00:44:56.095082 env[1417]: 2025-05-10 00:44:56.042 [INFO][4155] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4f8ebb2009d ContainerID="e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3" Namespace="calico-apiserver" Pod="calico-apiserver-6f6796fc67-z4mcn" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0" May 10 00:44:56.095082 env[1417]: 2025-05-10 00:44:56.073 [INFO][4155] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3" Namespace="calico-apiserver" Pod="calico-apiserver-6f6796fc67-z4mcn" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0" May 10 00:44:56.095082 env[1417]: 2025-05-10 00:44:56.075 [INFO][4155] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3" Namespace="calico-apiserver" Pod="calico-apiserver-6f6796fc67-z4mcn" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0", GenerateName:"calico-apiserver-6f6796fc67-", Namespace:"calico-apiserver", SelfLink:"", UID:"5c5ae991-5c69-4151-badb-79442d925e88", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6f6796fc67", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3", Pod:"calico-apiserver-6f6796fc67-z4mcn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.24.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4f8ebb2009d", MAC:"8a:24:64:19:99:72", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:56.095082 env[1417]: 2025-05-10 00:44:56.091 [INFO][4155] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3" Namespace="calico-apiserver" Pod="calico-apiserver-6f6796fc67-z4mcn" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0" May 10 00:44:56.107161 env[1417]: time="2025-05-10T00:44:56.107109747Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:56.108429 env[1417]: time="2025-05-10T00:44:56.108387255Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:56.109000 audit[4180]: NETFILTER_CFG table=filter:112 family=2 entries=48 op=nft_register_chain pid=4180 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:44:56.109000 audit[4180]: SYSCALL arch=c000003e syscall=46 success=yes exit=25868 a0=3 a1=7fffb6fe1f20 a2=0 a3=7fffb6fe1f0c items=0 ppid=3706 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:56.109000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:44:56.112887 env[1417]: time="2025-05-10T00:44:56.112854383Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:56.117746 env[1417]: time="2025-05-10T00:44:56.117708714Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:56.118050 env[1417]: time="2025-05-10T00:44:56.118023416Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 10 00:44:56.120895 env[1417]: time="2025-05-10T00:44:56.120860834Z" level=info msg="CreateContainer within sandbox \"e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 10 00:44:56.133829 env[1417]: time="2025-05-10T00:44:56.133734816Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:56.133829 env[1417]: time="2025-05-10T00:44:56.133775916Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:56.133829 env[1417]: time="2025-05-10T00:44:56.133791916Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:56.134163 env[1417]: time="2025-05-10T00:44:56.133975217Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3 pid=4193 runtime=io.containerd.runc.v2 May 10 00:44:56.170920 systemd[1]: Started cri-containerd-e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3.scope. May 10 00:44:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.187000 audit: BPF prog-id=171 op=LOAD May 10 00:44:56.188000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4193 pid=4203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:56.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530356463626232303731343665623131306339616434376532383433 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4193 pid=4203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:56.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530356463626232303731343665623131306339616434376532383433 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit: BPF prog-id=172 op=LOAD May 10 00:44:56.188000 audit[4203]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001f3ef0 items=0 ppid=4193 pid=4203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:56.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530356463626232303731343665623131306339616434376532383433 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit: BPF prog-id=173 op=LOAD May 10 00:44:56.188000 audit[4203]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001f3f38 items=0 ppid=4193 pid=4203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:56.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530356463626232303731343665623131306339616434376532383433 May 10 00:44:56.188000 audit: BPF prog-id=173 op=UNLOAD May 10 00:44:56.188000 audit: BPF prog-id=172 op=UNLOAD May 10 00:44:56.188000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.188000 audit: BPF prog-id=174 op=LOAD May 10 00:44:56.188000 audit[4203]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003d8348 items=0 ppid=4193 pid=4203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:56.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530356463626232303731343665623131306339616434376532383433 May 10 00:44:56.200795 env[1417]: time="2025-05-10T00:44:56.200743441Z" level=info msg="CreateContainer within sandbox \"e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"b097875244f97750de5dbbc07375e4b6a79745a1da4f1b06ffa304a63b5e5cde\"" May 10 00:44:56.203751 env[1417]: time="2025-05-10T00:44:56.203703660Z" level=info msg="StartContainer for \"b097875244f97750de5dbbc07375e4b6a79745a1da4f1b06ffa304a63b5e5cde\"" May 10 00:44:56.251537 systemd[1]: Started cri-containerd-b097875244f97750de5dbbc07375e4b6a79745a1da4f1b06ffa304a63b5e5cde.scope. May 10 00:44:56.258174 env[1417]: time="2025-05-10T00:44:56.258068205Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6f6796fc67-z4mcn,Uid:5c5ae991-5c69-4151-badb-79442d925e88,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3\"" May 10 00:44:56.268577 env[1417]: time="2025-05-10T00:44:56.268527971Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:44:56.292000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.292000 audit[4228]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f32d889c2f8 items=0 ppid=4091 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:56.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230393738373532343466393737353064653564626263303733373565 May 10 00:44:56.292000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.292000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.292000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.292000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.292000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.292000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.292000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.292000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.292000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.292000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.292000 audit: BPF prog-id=175 op=LOAD May 10 00:44:56.292000 audit[4228]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0000248c8 items=0 ppid=4091 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:56.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230393738373532343466393737353064653564626263303733373565 May 10 00:44:56.292000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.292000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.292000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.292000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.292000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.292000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.292000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.292000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.292000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.292000 audit: BPF prog-id=176 op=LOAD May 10 00:44:56.292000 audit[4228]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000024918 items=0 ppid=4091 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:56.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230393738373532343466393737353064653564626263303733373565 May 10 00:44:56.293000 audit: BPF prog-id=176 op=UNLOAD May 10 00:44:56.293000 audit: BPF prog-id=175 op=UNLOAD May 10 00:44:56.293000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.293000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.293000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.293000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.293000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.293000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.293000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.293000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.293000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.293000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:56.293000 audit: BPF prog-id=177 op=LOAD May 10 00:44:56.293000 audit[4228]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0000249a8 items=0 ppid=4091 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:56.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230393738373532343466393737353064653564626263303733373565 May 10 00:44:56.356424 env[1417]: time="2025-05-10T00:44:56.356302228Z" level=info msg="StartContainer for \"b097875244f97750de5dbbc07375e4b6a79745a1da4f1b06ffa304a63b5e5cde\" returns successfully" May 10 00:44:56.653970 env[1417]: time="2025-05-10T00:44:56.653726716Z" level=info msg="StopPodSandbox for \"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\"" May 10 00:44:56.654535 env[1417]: time="2025-05-10T00:44:56.654497221Z" level=info msg="StopPodSandbox for \"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\"" May 10 00:44:56.857884 systemd[1]: run-containerd-runc-k8s.io-82ce7916b01a4e43bb5b528f1228da214814a19205c14597435f0ea4161db6d7-runc.C1N8Ml.mount: Deactivated successfully. May 10 00:44:56.866384 env[1417]: 2025-05-10 00:44:56.743 [INFO][4294] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" May 10 00:44:56.866384 env[1417]: 2025-05-10 00:44:56.743 [INFO][4294] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" iface="eth0" netns="/var/run/netns/cni-fa472beb-66af-fffa-ac5b-f405e6804ef8" May 10 00:44:56.866384 env[1417]: 2025-05-10 00:44:56.743 [INFO][4294] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" iface="eth0" netns="/var/run/netns/cni-fa472beb-66af-fffa-ac5b-f405e6804ef8" May 10 00:44:56.866384 env[1417]: 2025-05-10 00:44:56.745 [INFO][4294] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" iface="eth0" netns="/var/run/netns/cni-fa472beb-66af-fffa-ac5b-f405e6804ef8" May 10 00:44:56.866384 env[1417]: 2025-05-10 00:44:56.745 [INFO][4294] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" May 10 00:44:56.866384 env[1417]: 2025-05-10 00:44:56.745 [INFO][4294] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" May 10 00:44:56.866384 env[1417]: 2025-05-10 00:44:56.826 [INFO][4308] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" HandleID="k8s-pod-network.51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0" May 10 00:44:56.866384 env[1417]: 2025-05-10 00:44:56.826 [INFO][4308] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:56.866384 env[1417]: 2025-05-10 00:44:56.828 [INFO][4308] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:56.866384 env[1417]: 2025-05-10 00:44:56.846 [WARNING][4308] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" HandleID="k8s-pod-network.51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0" May 10 00:44:56.866384 env[1417]: 2025-05-10 00:44:56.846 [INFO][4308] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" HandleID="k8s-pod-network.51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0" May 10 00:44:56.866384 env[1417]: 2025-05-10 00:44:56.860 [INFO][4308] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:56.866384 env[1417]: 2025-05-10 00:44:56.862 [INFO][4294] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" May 10 00:44:56.874822 systemd[1]: run-netns-cni\x2dfa472beb\x2d66af\x2dfffa\x2dac5b\x2df405e6804ef8.mount: Deactivated successfully. May 10 00:44:56.877643 env[1417]: time="2025-05-10T00:44:56.877593936Z" level=info msg="TearDown network for sandbox \"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\" successfully" May 10 00:44:56.877790 env[1417]: time="2025-05-10T00:44:56.877768537Z" level=info msg="StopPodSandbox for \"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\" returns successfully" May 10 00:44:56.878700 env[1417]: time="2025-05-10T00:44:56.878663743Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6f6796fc67-mfm9v,Uid:28042a2c-6cae-434f-a489-539111320f12,Namespace:calico-apiserver,Attempt:1,}" May 10 00:44:56.885951 env[1417]: 2025-05-10 00:44:56.750 [INFO][4295] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" May 10 00:44:56.885951 env[1417]: 2025-05-10 00:44:56.750 [INFO][4295] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" iface="eth0" netns="/var/run/netns/cni-2e130259-60f5-2e09-4082-d66220c2a238" May 10 00:44:56.885951 env[1417]: 2025-05-10 00:44:56.751 [INFO][4295] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" iface="eth0" netns="/var/run/netns/cni-2e130259-60f5-2e09-4082-d66220c2a238" May 10 00:44:56.885951 env[1417]: 2025-05-10 00:44:56.751 [INFO][4295] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" iface="eth0" netns="/var/run/netns/cni-2e130259-60f5-2e09-4082-d66220c2a238" May 10 00:44:56.885951 env[1417]: 2025-05-10 00:44:56.751 [INFO][4295] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" May 10 00:44:56.885951 env[1417]: 2025-05-10 00:44:56.751 [INFO][4295] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" May 10 00:44:56.885951 env[1417]: 2025-05-10 00:44:56.855 [INFO][4314] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" HandleID="k8s-pod-network.7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0" May 10 00:44:56.885951 env[1417]: 2025-05-10 00:44:56.859 [INFO][4314] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:56.885951 env[1417]: 2025-05-10 00:44:56.861 [INFO][4314] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:56.885951 env[1417]: 2025-05-10 00:44:56.881 [WARNING][4314] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" HandleID="k8s-pod-network.7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0" May 10 00:44:56.885951 env[1417]: 2025-05-10 00:44:56.882 [INFO][4314] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" HandleID="k8s-pod-network.7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0" May 10 00:44:56.885951 env[1417]: 2025-05-10 00:44:56.883 [INFO][4314] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:56.885951 env[1417]: 2025-05-10 00:44:56.884 [INFO][4295] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" May 10 00:44:56.887325 env[1417]: time="2025-05-10T00:44:56.886112390Z" level=info msg="TearDown network for sandbox \"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\" successfully" May 10 00:44:56.887325 env[1417]: time="2025-05-10T00:44:56.886151691Z" level=info msg="StopPodSandbox for \"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\" returns successfully" May 10 00:44:56.887699 env[1417]: time="2025-05-10T00:44:56.887661400Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-4b7hx,Uid:34f77ccb-223c-4aec-af9c-f1311dfd9100,Namespace:kube-system,Attempt:1,}" May 10 00:44:57.175167 systemd-networkd[1571]: calife31a610a0c: Link UP May 10 00:44:57.196580 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:44:57.196737 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calife31a610a0c: link becomes ready May 10 00:44:57.200789 systemd-networkd[1571]: calife31a610a0c: Gained carrier May 10 00:44:57.240959 env[1417]: 2025-05-10 00:44:57.039 [INFO][4351] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0 coredns-7db6d8ff4d- kube-system 34f77ccb-223c-4aec-af9c-f1311dfd9100 796 0 2025-05-10 00:44:19 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-d5b055839e coredns-7db6d8ff4d-4b7hx eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calife31a610a0c [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4b7hx" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-" May 10 00:44:57.240959 env[1417]: 2025-05-10 00:44:57.039 [INFO][4351] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4b7hx" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0" May 10 00:44:57.240959 env[1417]: 2025-05-10 00:44:57.107 [INFO][4369] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d" HandleID="k8s-pod-network.347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0" May 10 00:44:57.240959 env[1417]: 2025-05-10 00:44:57.125 [INFO][4369] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d" HandleID="k8s-pod-network.347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031a2c0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-d5b055839e", "pod":"coredns-7db6d8ff4d-4b7hx", "timestamp":"2025-05-10 00:44:57.107203984 +0000 UTC"}, Hostname:"ci-3510.3.7-n-d5b055839e", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:44:57.240959 env[1417]: 2025-05-10 00:44:57.125 [INFO][4369] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:57.240959 env[1417]: 2025-05-10 00:44:57.125 [INFO][4369] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:57.240959 env[1417]: 2025-05-10 00:44:57.125 [INFO][4369] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-d5b055839e' May 10 00:44:57.240959 env[1417]: 2025-05-10 00:44:57.131 [INFO][4369] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:57.240959 env[1417]: 2025-05-10 00:44:57.137 [INFO][4369] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-d5b055839e" May 10 00:44:57.240959 env[1417]: 2025-05-10 00:44:57.142 [INFO][4369] ipam/ipam.go 489: Trying affinity for 192.168.24.128/26 host="ci-3510.3.7-n-d5b055839e" May 10 00:44:57.240959 env[1417]: 2025-05-10 00:44:57.145 [INFO][4369] ipam/ipam.go 155: Attempting to load block cidr=192.168.24.128/26 host="ci-3510.3.7-n-d5b055839e" May 10 00:44:57.240959 env[1417]: 2025-05-10 00:44:57.148 [INFO][4369] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.24.128/26 host="ci-3510.3.7-n-d5b055839e" May 10 00:44:57.240959 env[1417]: 2025-05-10 00:44:57.148 [INFO][4369] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.24.128/26 handle="k8s-pod-network.347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:57.240959 env[1417]: 2025-05-10 00:44:57.150 [INFO][4369] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d May 10 00:44:57.240959 env[1417]: 2025-05-10 00:44:57.160 [INFO][4369] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.24.128/26 handle="k8s-pod-network.347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:57.240959 env[1417]: 2025-05-10 00:44:57.166 [INFO][4369] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.24.132/26] block=192.168.24.128/26 handle="k8s-pod-network.347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:57.240959 env[1417]: 2025-05-10 00:44:57.167 [INFO][4369] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.24.132/26] handle="k8s-pod-network.347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:57.240959 env[1417]: 2025-05-10 00:44:57.167 [INFO][4369] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:57.240959 env[1417]: 2025-05-10 00:44:57.167 [INFO][4369] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.24.132/26] IPv6=[] ContainerID="347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d" HandleID="k8s-pod-network.347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0" May 10 00:44:57.242190 env[1417]: 2025-05-10 00:44:57.168 [INFO][4351] cni-plugin/k8s.go 386: Populated endpoint ContainerID="347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4b7hx" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"34f77ccb-223c-4aec-af9c-f1311dfd9100", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"", Pod:"coredns-7db6d8ff4d-4b7hx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.24.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calife31a610a0c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:57.242190 env[1417]: 2025-05-10 00:44:57.168 [INFO][4351] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.24.132/32] ContainerID="347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4b7hx" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0" May 10 00:44:57.242190 env[1417]: 2025-05-10 00:44:57.168 [INFO][4351] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calife31a610a0c ContainerID="347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4b7hx" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0" May 10 00:44:57.242190 env[1417]: 2025-05-10 00:44:57.201 [INFO][4351] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4b7hx" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0" May 10 00:44:57.242190 env[1417]: 2025-05-10 00:44:57.202 [INFO][4351] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4b7hx" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"34f77ccb-223c-4aec-af9c-f1311dfd9100", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d", Pod:"coredns-7db6d8ff4d-4b7hx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.24.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calife31a610a0c", MAC:"a2:04:4b:88:80:08", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:57.242190 env[1417]: 2025-05-10 00:44:57.232 [INFO][4351] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4b7hx" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0" May 10 00:44:57.271000 audit[4391]: NETFILTER_CFG table=filter:113 family=2 entries=38 op=nft_register_chain pid=4391 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:44:57.271000 audit[4391]: SYSCALL arch=c000003e syscall=46 success=yes exit=19408 a0=3 a1=7ffc8f2c1030 a2=0 a3=7ffc8f2c101c items=0 ppid=3706 pid=4391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.271000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:44:57.298545 systemd-networkd[1571]: calie75307ce15a: Link UP May 10 00:44:57.313655 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie75307ce15a: link becomes ready May 10 00:44:57.320827 systemd-networkd[1571]: calie75307ce15a: Gained carrier May 10 00:44:57.331004 env[1417]: time="2025-05-10T00:44:57.330908284Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:57.331286 env[1417]: time="2025-05-10T00:44:57.331232486Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:57.331407 env[1417]: time="2025-05-10T00:44:57.331382087Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:57.331706 env[1417]: time="2025-05-10T00:44:57.331657489Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d pid=4407 runtime=io.containerd.runc.v2 May 10 00:44:57.348039 env[1417]: 2025-05-10 00:44:57.048 [INFO][4341] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0 calico-apiserver-6f6796fc67- calico-apiserver 28042a2c-6cae-434f-a489-539111320f12 795 0 2025-05-10 00:44:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6f6796fc67 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-d5b055839e calico-apiserver-6f6796fc67-mfm9v eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie75307ce15a [] []}} ContainerID="b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca" Namespace="calico-apiserver" Pod="calico-apiserver-6f6796fc67-mfm9v" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-" May 10 00:44:57.348039 env[1417]: 2025-05-10 00:44:57.049 [INFO][4341] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca" Namespace="calico-apiserver" Pod="calico-apiserver-6f6796fc67-mfm9v" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0" May 10 00:44:57.348039 env[1417]: 2025-05-10 00:44:57.124 [INFO][4374] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca" HandleID="k8s-pod-network.b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0" May 10 00:44:57.348039 env[1417]: 2025-05-10 00:44:57.134 [INFO][4374] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca" HandleID="k8s-pod-network.b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003127b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-d5b055839e", "pod":"calico-apiserver-6f6796fc67-mfm9v", "timestamp":"2025-05-10 00:44:57.124206791 +0000 UTC"}, Hostname:"ci-3510.3.7-n-d5b055839e", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:44:57.348039 env[1417]: 2025-05-10 00:44:57.135 [INFO][4374] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:57.348039 env[1417]: 2025-05-10 00:44:57.167 [INFO][4374] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:57.348039 env[1417]: 2025-05-10 00:44:57.167 [INFO][4374] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-d5b055839e' May 10 00:44:57.348039 env[1417]: 2025-05-10 00:44:57.191 [INFO][4374] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:57.348039 env[1417]: 2025-05-10 00:44:57.227 [INFO][4374] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-d5b055839e" May 10 00:44:57.348039 env[1417]: 2025-05-10 00:44:57.251 [INFO][4374] ipam/ipam.go 489: Trying affinity for 192.168.24.128/26 host="ci-3510.3.7-n-d5b055839e" May 10 00:44:57.348039 env[1417]: 2025-05-10 00:44:57.253 [INFO][4374] ipam/ipam.go 155: Attempting to load block cidr=192.168.24.128/26 host="ci-3510.3.7-n-d5b055839e" May 10 00:44:57.348039 env[1417]: 2025-05-10 00:44:57.261 [INFO][4374] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.24.128/26 host="ci-3510.3.7-n-d5b055839e" May 10 00:44:57.348039 env[1417]: 2025-05-10 00:44:57.261 [INFO][4374] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.24.128/26 handle="k8s-pod-network.b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:57.348039 env[1417]: 2025-05-10 00:44:57.266 [INFO][4374] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca May 10 00:44:57.348039 env[1417]: 2025-05-10 00:44:57.276 [INFO][4374] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.24.128/26 handle="k8s-pod-network.b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:57.348039 env[1417]: 2025-05-10 00:44:57.290 [INFO][4374] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.24.133/26] block=192.168.24.128/26 handle="k8s-pod-network.b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:57.348039 env[1417]: 2025-05-10 00:44:57.290 [INFO][4374] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.24.133/26] handle="k8s-pod-network.b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:57.348039 env[1417]: 2025-05-10 00:44:57.290 [INFO][4374] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:57.348039 env[1417]: 2025-05-10 00:44:57.290 [INFO][4374] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.24.133/26] IPv6=[] ContainerID="b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca" HandleID="k8s-pod-network.b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0" May 10 00:44:57.349005 env[1417]: 2025-05-10 00:44:57.292 [INFO][4341] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca" Namespace="calico-apiserver" Pod="calico-apiserver-6f6796fc67-mfm9v" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0", GenerateName:"calico-apiserver-6f6796fc67-", Namespace:"calico-apiserver", SelfLink:"", UID:"28042a2c-6cae-434f-a489-539111320f12", ResourceVersion:"795", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6f6796fc67", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"", Pod:"calico-apiserver-6f6796fc67-mfm9v", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.24.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie75307ce15a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:57.349005 env[1417]: 2025-05-10 00:44:57.292 [INFO][4341] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.24.133/32] ContainerID="b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca" Namespace="calico-apiserver" Pod="calico-apiserver-6f6796fc67-mfm9v" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0" May 10 00:44:57.349005 env[1417]: 2025-05-10 00:44:57.292 [INFO][4341] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie75307ce15a ContainerID="b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca" Namespace="calico-apiserver" Pod="calico-apiserver-6f6796fc67-mfm9v" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0" May 10 00:44:57.349005 env[1417]: 2025-05-10 00:44:57.321 [INFO][4341] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca" Namespace="calico-apiserver" Pod="calico-apiserver-6f6796fc67-mfm9v" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0" May 10 00:44:57.349005 env[1417]: 2025-05-10 00:44:57.321 [INFO][4341] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca" Namespace="calico-apiserver" Pod="calico-apiserver-6f6796fc67-mfm9v" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0", GenerateName:"calico-apiserver-6f6796fc67-", Namespace:"calico-apiserver", SelfLink:"", UID:"28042a2c-6cae-434f-a489-539111320f12", ResourceVersion:"795", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6f6796fc67", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca", Pod:"calico-apiserver-6f6796fc67-mfm9v", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.24.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie75307ce15a", MAC:"f2:4b:45:3f:0a:49", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:57.349005 env[1417]: 2025-05-10 00:44:57.346 [INFO][4341] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca" Namespace="calico-apiserver" Pod="calico-apiserver-6f6796fc67-mfm9v" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0" May 10 00:44:57.362272 systemd[1]: Started cri-containerd-347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d.scope. May 10 00:44:57.392940 env[1417]: time="2025-05-10T00:44:57.392847872Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:57.393210 env[1417]: time="2025-05-10T00:44:57.393161574Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:57.394351 env[1417]: time="2025-05-10T00:44:57.393311375Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:57.394351 env[1417]: time="2025-05-10T00:44:57.393484276Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca pid=4451 runtime=io.containerd.runc.v2 May 10 00:44:57.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.408000 audit: BPF prog-id=178 op=LOAD May 10 00:44:57.409000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4407 pid=4419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334373732373639306635366637306562373064346266363139373066 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4407 pid=4419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334373732373639306635366637306562373064346266363139373066 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit: BPF prog-id=179 op=LOAD May 10 00:44:57.409000 audit[4419]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a92d0 items=0 ppid=4407 pid=4419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334373732373639306635366637306562373064346266363139373066 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit: BPF prog-id=180 op=LOAD May 10 00:44:57.409000 audit[4419]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a9318 items=0 ppid=4407 pid=4419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334373732373639306635366637306562373064346266363139373066 May 10 00:44:57.409000 audit: BPF prog-id=180 op=UNLOAD May 10 00:44:57.409000 audit: BPF prog-id=179 op=UNLOAD May 10 00:44:57.409000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.409000 audit: BPF prog-id=181 op=LOAD May 10 00:44:57.409000 audit[4419]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a9728 items=0 ppid=4407 pid=4419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334373732373639306635366637306562373064346266363139373066 May 10 00:44:57.421046 systemd[1]: Started cri-containerd-b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca.scope. May 10 00:44:57.463965 env[1417]: time="2025-05-10T00:44:57.463848216Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-4b7hx,Uid:34f77ccb-223c-4aec-af9c-f1311dfd9100,Namespace:kube-system,Attempt:1,} returns sandbox id \"347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d\"" May 10 00:44:57.472997 env[1417]: time="2025-05-10T00:44:57.472948173Z" level=info msg="CreateContainer within sandbox \"347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:44:57.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.477000 audit: BPF prog-id=182 op=LOAD May 10 00:44:57.478000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4451 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230346335363833316539366261316137633931316437303464323531 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4451 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230346335363833316539366261316137633931316437303464323531 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit: BPF prog-id=183 op=LOAD May 10 00:44:57.478000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003a41e0 items=0 ppid=4451 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230346335363833316539366261316137633931316437303464323531 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit: BPF prog-id=184 op=LOAD May 10 00:44:57.478000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003a4228 items=0 ppid=4451 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230346335363833316539366261316137633931316437303464323531 May 10 00:44:57.478000 audit: BPF prog-id=184 op=UNLOAD May 10 00:44:57.478000 audit: BPF prog-id=183 op=UNLOAD May 10 00:44:57.478000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.478000 audit: BPF prog-id=185 op=LOAD May 10 00:44:57.478000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a4638 items=0 ppid=4451 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230346335363833316539366261316137633931316437303464323531 May 10 00:44:57.527484 env[1417]: time="2025-05-10T00:44:57.527416614Z" level=info msg="CreateContainer within sandbox \"347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"ab56b74d392c03fd7783c4d833b51ff06fd4b81e7b735490db0fbb0f7fa5fdb2\"" May 10 00:44:57.529526 env[1417]: time="2025-05-10T00:44:57.528437921Z" level=info msg="StartContainer for \"ab56b74d392c03fd7783c4d833b51ff06fd4b81e7b735490db0fbb0f7fa5fdb2\"" May 10 00:44:57.540000 audit[4488]: NETFILTER_CFG table=filter:114 family=2 entries=52 op=nft_register_chain pid=4488 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:44:57.540000 audit[4488]: SYSCALL arch=c000003e syscall=46 success=yes exit=26744 a0=3 a1=7ffe6a6c67f0 a2=0 a3=7ffe6a6c67dc items=0 ppid=3706 pid=4488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.540000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:44:57.565713 systemd[1]: Started cri-containerd-ab56b74d392c03fd7783c4d833b51ff06fd4b81e7b735490db0fbb0f7fa5fdb2.scope. May 10 00:44:57.571223 env[1417]: time="2025-05-10T00:44:57.571155888Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6f6796fc67-mfm9v,Uid:28042a2c-6cae-434f-a489-539111320f12,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca\"" May 10 00:44:57.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.592000 audit: BPF prog-id=186 op=LOAD May 10 00:44:57.593000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4407 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162353662373464333932633033666437373833633464383333623531 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4407 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162353662373464333932633033666437373833633464383333623531 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit: BPF prog-id=187 op=LOAD May 10 00:44:57.593000 audit[4497]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003083a0 items=0 ppid=4407 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162353662373464333932633033666437373833633464383333623531 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit: BPF prog-id=188 op=LOAD May 10 00:44:57.593000 audit[4497]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003083e8 items=0 ppid=4407 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162353662373464333932633033666437373833633464383333623531 May 10 00:44:57.593000 audit: BPF prog-id=188 op=UNLOAD May 10 00:44:57.593000 audit: BPF prog-id=187 op=UNLOAD May 10 00:44:57.593000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.593000 audit: BPF prog-id=189 op=LOAD May 10 00:44:57.593000 audit[4497]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003087f8 items=0 ppid=4407 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162353662373464333932633033666437373833633464383333623531 May 10 00:44:57.602539 systemd-networkd[1571]: cali4f8ebb2009d: Gained IPv6LL May 10 00:44:57.631482 env[1417]: time="2025-05-10T00:44:57.631413365Z" level=info msg="StartContainer for \"ab56b74d392c03fd7783c4d833b51ff06fd4b81e7b735490db0fbb0f7fa5fdb2\" returns successfully" May 10 00:44:57.656117 env[1417]: time="2025-05-10T00:44:57.656032019Z" level=info msg="StopPodSandbox for \"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\"" May 10 00:44:57.792765 systemd[1]: run-netns-cni\x2d2e130259\x2d60f5\x2d2e09\x2d4082\x2dd66220c2a238.mount: Deactivated successfully. May 10 00:44:57.861112 env[1417]: 2025-05-10 00:44:57.763 [INFO][4554] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" May 10 00:44:57.861112 env[1417]: 2025-05-10 00:44:57.764 [INFO][4554] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" iface="eth0" netns="/var/run/netns/cni-e8be6db2-07c6-5fe8-4a88-2b6dfa10fe38" May 10 00:44:57.861112 env[1417]: 2025-05-10 00:44:57.764 [INFO][4554] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" iface="eth0" netns="/var/run/netns/cni-e8be6db2-07c6-5fe8-4a88-2b6dfa10fe38" May 10 00:44:57.861112 env[1417]: 2025-05-10 00:44:57.764 [INFO][4554] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" iface="eth0" netns="/var/run/netns/cni-e8be6db2-07c6-5fe8-4a88-2b6dfa10fe38" May 10 00:44:57.861112 env[1417]: 2025-05-10 00:44:57.764 [INFO][4554] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" May 10 00:44:57.861112 env[1417]: 2025-05-10 00:44:57.764 [INFO][4554] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" May 10 00:44:57.861112 env[1417]: 2025-05-10 00:44:57.827 [INFO][4561] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" HandleID="k8s-pod-network.748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0" May 10 00:44:57.861112 env[1417]: 2025-05-10 00:44:57.828 [INFO][4561] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:57.861112 env[1417]: 2025-05-10 00:44:57.828 [INFO][4561] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:57.861112 env[1417]: 2025-05-10 00:44:57.853 [WARNING][4561] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" HandleID="k8s-pod-network.748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0" May 10 00:44:57.861112 env[1417]: 2025-05-10 00:44:57.853 [INFO][4561] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" HandleID="k8s-pod-network.748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0" May 10 00:44:57.861112 env[1417]: 2025-05-10 00:44:57.857 [INFO][4561] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:57.861112 env[1417]: 2025-05-10 00:44:57.859 [INFO][4554] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" May 10 00:44:57.865950 env[1417]: time="2025-05-10T00:44:57.861928408Z" level=info msg="TearDown network for sandbox \"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\" successfully" May 10 00:44:57.865950 env[1417]: time="2025-05-10T00:44:57.861990508Z" level=info msg="StopPodSandbox for \"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\" returns successfully" May 10 00:44:57.865950 env[1417]: time="2025-05-10T00:44:57.863107615Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-d465f4dc7-tgv6g,Uid:283e0cc9-b0f3-4c21-b09c-2a9c6cb13ecb,Namespace:calico-system,Attempt:1,}" May 10 00:44:57.865129 systemd[1]: run-netns-cni\x2de8be6db2\x2d07c6\x2d5fe8\x2d4a88\x2d2b6dfa10fe38.mount: Deactivated successfully. May 10 00:44:57.969664 kubelet[2528]: I0510 00:44:57.969560 2528 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-4b7hx" podStartSLOduration=38.969537781 podStartE2EDuration="38.969537781s" podCreationTimestamp="2025-05-10 00:44:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:44:57.968342374 +0000 UTC m=+52.402268920" watchObservedRunningTime="2025-05-10 00:44:57.969537781 +0000 UTC m=+52.403464427" May 10 00:44:58.035000 audit[4580]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:58.035000 audit[4580]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffc3c65e00 a2=0 a3=7fffc3c65dec items=0 ppid=2685 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.035000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:58.041000 audit[4580]: NETFILTER_CFG table=nat:116 family=2 entries=44 op=nft_register_rule pid=4580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:58.041000 audit[4580]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fffc3c65e00 a2=0 a3=7fffc3c65dec items=0 ppid=2685 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:58.053000 audit[4587]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4587 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:58.053000 audit[4587]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd2ce2ed50 a2=0 a3=7ffd2ce2ed3c items=0 ppid=2685 pid=4587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.053000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:58.081000 audit[4587]: NETFILTER_CFG table=nat:118 family=2 entries=56 op=nft_register_chain pid=4587 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:58.081000 audit[4587]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd2ce2ed50 a2=0 a3=7ffd2ce2ed3c items=0 ppid=2685 pid=4587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.081000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:58.147453 systemd-networkd[1571]: calif73350d27f1: Link UP May 10 00:44:58.158474 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif73350d27f1: link becomes ready May 10 00:44:58.159076 systemd-networkd[1571]: calif73350d27f1: Gained carrier May 10 00:44:58.180330 env[1417]: 2025-05-10 00:44:58.026 [INFO][4568] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0 calico-kube-controllers-d465f4dc7- calico-system 283e0cc9-b0f3-4c21-b09c-2a9c6cb13ecb 813 0 2025-05-10 00:44:26 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:d465f4dc7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.7-n-d5b055839e calico-kube-controllers-d465f4dc7-tgv6g eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calif73350d27f1 [] []}} ContainerID="69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08" Namespace="calico-system" Pod="calico-kube-controllers-d465f4dc7-tgv6g" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-" May 10 00:44:58.180330 env[1417]: 2025-05-10 00:44:58.027 [INFO][4568] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08" Namespace="calico-system" Pod="calico-kube-controllers-d465f4dc7-tgv6g" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0" May 10 00:44:58.180330 env[1417]: 2025-05-10 00:44:58.087 [INFO][4582] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08" HandleID="k8s-pod-network.69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0" May 10 00:44:58.180330 env[1417]: 2025-05-10 00:44:58.099 [INFO][4582] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08" HandleID="k8s-pod-network.69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002907e0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-d5b055839e", "pod":"calico-kube-controllers-d465f4dc7-tgv6g", "timestamp":"2025-05-10 00:44:58.087025009 +0000 UTC"}, Hostname:"ci-3510.3.7-n-d5b055839e", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:44:58.180330 env[1417]: 2025-05-10 00:44:58.099 [INFO][4582] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:58.180330 env[1417]: 2025-05-10 00:44:58.099 [INFO][4582] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:58.180330 env[1417]: 2025-05-10 00:44:58.099 [INFO][4582] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-d5b055839e' May 10 00:44:58.180330 env[1417]: 2025-05-10 00:44:58.101 [INFO][4582] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:58.180330 env[1417]: 2025-05-10 00:44:58.107 [INFO][4582] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-d5b055839e" May 10 00:44:58.180330 env[1417]: 2025-05-10 00:44:58.112 [INFO][4582] ipam/ipam.go 489: Trying affinity for 192.168.24.128/26 host="ci-3510.3.7-n-d5b055839e" May 10 00:44:58.180330 env[1417]: 2025-05-10 00:44:58.115 [INFO][4582] ipam/ipam.go 155: Attempting to load block cidr=192.168.24.128/26 host="ci-3510.3.7-n-d5b055839e" May 10 00:44:58.180330 env[1417]: 2025-05-10 00:44:58.118 [INFO][4582] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.24.128/26 host="ci-3510.3.7-n-d5b055839e" May 10 00:44:58.180330 env[1417]: 2025-05-10 00:44:58.118 [INFO][4582] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.24.128/26 handle="k8s-pod-network.69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:58.180330 env[1417]: 2025-05-10 00:44:58.121 [INFO][4582] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08 May 10 00:44:58.180330 env[1417]: 2025-05-10 00:44:58.130 [INFO][4582] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.24.128/26 handle="k8s-pod-network.69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:58.180330 env[1417]: 2025-05-10 00:44:58.139 [INFO][4582] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.24.134/26] block=192.168.24.128/26 handle="k8s-pod-network.69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:58.180330 env[1417]: 2025-05-10 00:44:58.139 [INFO][4582] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.24.134/26] handle="k8s-pod-network.69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08" host="ci-3510.3.7-n-d5b055839e" May 10 00:44:58.180330 env[1417]: 2025-05-10 00:44:58.139 [INFO][4582] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:58.180330 env[1417]: 2025-05-10 00:44:58.139 [INFO][4582] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.24.134/26] IPv6=[] ContainerID="69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08" HandleID="k8s-pod-network.69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0" May 10 00:44:58.181555 env[1417]: 2025-05-10 00:44:58.143 [INFO][4568] cni-plugin/k8s.go 386: Populated endpoint ContainerID="69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08" Namespace="calico-system" Pod="calico-kube-controllers-d465f4dc7-tgv6g" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0", GenerateName:"calico-kube-controllers-d465f4dc7-", Namespace:"calico-system", SelfLink:"", UID:"283e0cc9-b0f3-4c21-b09c-2a9c6cb13ecb", ResourceVersion:"813", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"d465f4dc7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"", Pod:"calico-kube-controllers-d465f4dc7-tgv6g", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.24.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif73350d27f1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:58.181555 env[1417]: 2025-05-10 00:44:58.143 [INFO][4568] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.24.134/32] ContainerID="69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08" Namespace="calico-system" Pod="calico-kube-controllers-d465f4dc7-tgv6g" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0" May 10 00:44:58.181555 env[1417]: 2025-05-10 00:44:58.144 [INFO][4568] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif73350d27f1 ContainerID="69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08" Namespace="calico-system" Pod="calico-kube-controllers-d465f4dc7-tgv6g" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0" May 10 00:44:58.181555 env[1417]: 2025-05-10 00:44:58.162 [INFO][4568] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08" Namespace="calico-system" Pod="calico-kube-controllers-d465f4dc7-tgv6g" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0" May 10 00:44:58.181555 env[1417]: 2025-05-10 00:44:58.163 [INFO][4568] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08" Namespace="calico-system" Pod="calico-kube-controllers-d465f4dc7-tgv6g" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0", GenerateName:"calico-kube-controllers-d465f4dc7-", Namespace:"calico-system", SelfLink:"", UID:"283e0cc9-b0f3-4c21-b09c-2a9c6cb13ecb", ResourceVersion:"813", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"d465f4dc7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08", Pod:"calico-kube-controllers-d465f4dc7-tgv6g", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.24.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif73350d27f1", MAC:"3e:a1:c7:c7:e6:66", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:58.181555 env[1417]: 2025-05-10 00:44:58.178 [INFO][4568] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08" Namespace="calico-system" Pod="calico-kube-controllers-d465f4dc7-tgv6g" WorkloadEndpoint="ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0" May 10 00:44:58.200000 audit[4604]: NETFILTER_CFG table=filter:119 family=2 entries=52 op=nft_register_chain pid=4604 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:44:58.200000 audit[4604]: SYSCALL arch=c000003e syscall=46 success=yes exit=25040 a0=3 a1=7ffdea264880 a2=0 a3=7ffdea26486c items=0 ppid=3706 pid=4604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.200000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:44:58.484721 env[1417]: time="2025-05-10T00:44:58.484627364Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:58.484721 env[1417]: time="2025-05-10T00:44:58.484683365Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:58.484721 env[1417]: time="2025-05-10T00:44:58.484697565Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:58.485288 env[1417]: time="2025-05-10T00:44:58.485198168Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08 pid=4613 runtime=io.containerd.runc.v2 May 10 00:44:58.526645 systemd[1]: Started cri-containerd-69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08.scope. May 10 00:44:58.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.649000 audit: BPF prog-id=190 op=LOAD May 10 00:44:58.651000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.651000 audit[4623]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4613 pid=4623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639613832323462643964396231613661663163363561656661313239 May 10 00:44:58.651000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.651000 audit[4623]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4613 pid=4623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639613832323462643964396231613661663163363561656661313239 May 10 00:44:58.651000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.651000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.651000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.651000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.651000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.651000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.651000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.651000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.651000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.651000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.651000 audit: BPF prog-id=191 op=LOAD May 10 00:44:58.651000 audit[4623]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000384850 items=0 ppid=4613 pid=4623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639613832323462643964396231613661663163363561656661313239 May 10 00:44:58.652000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.652000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.652000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.652000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.652000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.652000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.652000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.652000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.652000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.652000 audit: BPF prog-id=192 op=LOAD May 10 00:44:58.652000 audit[4623]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000384898 items=0 ppid=4613 pid=4623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639613832323462643964396231613661663163363561656661313239 May 10 00:44:58.653000 audit: BPF prog-id=192 op=UNLOAD May 10 00:44:58.653000 audit: BPF prog-id=191 op=UNLOAD May 10 00:44:58.653000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.653000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.653000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.653000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.653000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.653000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.653000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.653000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.653000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.653000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.653000 audit: BPF prog-id=193 op=LOAD May 10 00:44:58.653000 audit[4623]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000384ca8 items=0 ppid=4613 pid=4623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639613832323462643964396231613661663163363561656661313239 May 10 00:44:58.709979 env[1417]: time="2025-05-10T00:44:58.709912955Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-d465f4dc7-tgv6g,Uid:283e0cc9-b0f3-4c21-b09c-2a9c6cb13ecb,Namespace:calico-system,Attempt:1,} returns sandbox id \"69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08\"" May 10 00:44:59.074523 systemd-networkd[1571]: calife31a610a0c: Gained IPv6LL May 10 00:44:59.138471 systemd-networkd[1571]: calie75307ce15a: Gained IPv6LL May 10 00:44:59.592880 env[1417]: time="2025-05-10T00:44:59.592819758Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:59.600100 env[1417]: time="2025-05-10T00:44:59.600043002Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:59.606233 env[1417]: time="2025-05-10T00:44:59.606180539Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:59.612322 env[1417]: time="2025-05-10T00:44:59.612272676Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:59.612777 env[1417]: time="2025-05-10T00:44:59.612735879Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:44:59.614633 env[1417]: time="2025-05-10T00:44:59.614598191Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 10 00:44:59.616624 env[1417]: time="2025-05-10T00:44:59.616529102Z" level=info msg="CreateContainer within sandbox \"e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:44:59.670602 env[1417]: time="2025-05-10T00:44:59.670540131Z" level=info msg="CreateContainer within sandbox \"e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"8d4c026172e4bc8b518d9e2d6f6c5f01de2377f4b935493fbf1b743d9e3c098a\"" May 10 00:44:59.671291 env[1417]: time="2025-05-10T00:44:59.671176235Z" level=info msg="StartContainer for \"8d4c026172e4bc8b518d9e2d6f6c5f01de2377f4b935493fbf1b743d9e3c098a\"" May 10 00:44:59.697431 systemd[1]: Started cri-containerd-8d4c026172e4bc8b518d9e2d6f6c5f01de2377f4b935493fbf1b743d9e3c098a.scope. May 10 00:44:59.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.731977 kernel: kauditd_printk_skb: 399 callbacks suppressed May 10 00:44:59.732014 kernel: audit: type=1400 audit(1746837899.726:1284): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.760948 kernel: audit: type=1400 audit(1746837899.726:1285): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.761083 kernel: audit: type=1400 audit(1746837899.726:1286): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.793937 kernel: audit: type=1400 audit(1746837899.726:1287): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.808294 kernel: audit: type=1400 audit(1746837899.726:1288): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.823471 kernel: audit: type=1400 audit(1746837899.726:1289): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.856079 kernel: audit: type=1400 audit(1746837899.726:1290): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.856273 kernel: audit: type=1400 audit(1746837899.726:1291): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.856300 kernel: audit: type=1400 audit(1746837899.726:1292): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.857260 systemd-networkd[1571]: calif73350d27f1: Gained IPv6LL May 10 00:44:59.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.874935 env[1417]: time="2025-05-10T00:44:59.874889076Z" level=info msg="StartContainer for \"8d4c026172e4bc8b518d9e2d6f6c5f01de2377f4b935493fbf1b743d9e3c098a\" returns successfully" May 10 00:44:59.884348 kernel: audit: type=1400 audit(1746837899.759:1293): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.759000 audit: BPF prog-id=194 op=LOAD May 10 00:44:59.759000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.759000 audit[4653]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4193 pid=4653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:59.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864346330323631373265346263386235313864396532643666366335 May 10 00:44:59.759000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.759000 audit[4653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4193 pid=4653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:59.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864346330323631373265346263386235313864396532643666366335 May 10 00:44:59.759000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.759000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.759000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.759000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.759000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.759000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.759000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.759000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.759000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.759000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.759000 audit: BPF prog-id=195 op=LOAD May 10 00:44:59.759000 audit[4653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003de1c0 items=0 ppid=4193 pid=4653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:59.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864346330323631373265346263386235313864396532643666366335 May 10 00:44:59.773000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.773000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.773000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.773000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.773000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.773000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.773000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.773000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.773000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.773000 audit: BPF prog-id=196 op=LOAD May 10 00:44:59.773000 audit[4653]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003de208 items=0 ppid=4193 pid=4653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:59.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864346330323631373265346263386235313864396532643666366335 May 10 00:44:59.792000 audit: BPF prog-id=196 op=UNLOAD May 10 00:44:59.792000 audit: BPF prog-id=195 op=UNLOAD May 10 00:44:59.792000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.792000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.792000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.792000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.792000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.792000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.792000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.792000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.792000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.792000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.792000 audit: BPF prog-id=197 op=LOAD May 10 00:44:59.792000 audit[4653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003de618 items=0 ppid=4193 pid=4653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:59.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864346330323631373265346263386235313864396532643666366335 May 10 00:45:00.088000 audit[4686]: NETFILTER_CFG table=filter:120 family=2 entries=10 op=nft_register_rule pid=4686 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:00.088000 audit[4686]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff60669f70 a2=0 a3=7fff60669f5c items=0 ppid=2685 pid=4686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:00.088000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:00.091000 audit[4686]: NETFILTER_CFG table=nat:121 family=2 entries=20 op=nft_register_rule pid=4686 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:00.091000 audit[4686]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff60669f70 a2=0 a3=7fff60669f5c items=0 ppid=2685 pid=4686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:00.091000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:00.690000 audit[4665]: AVC avc: denied { watch } for pid=4665 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_44_40.169962964/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c436,c851 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c436,c851 tclass=file permissive=0 May 10 00:45:00.690000 audit[4665]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b3a800 a2=fc6 a3=0 items=0 ppid=4193 pid=4665 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c436,c851 key=(null) May 10 00:45:00.690000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:45:00.712221 kubelet[2528]: I0510 00:45:00.712133 2528 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6f6796fc67-z4mcn" podStartSLOduration=32.358600853 podStartE2EDuration="35.71210632s" podCreationTimestamp="2025-05-10 00:44:25 +0000 UTC" firstStartedPulling="2025-05-10 00:44:56.260624721 +0000 UTC m=+50.694551267" lastFinishedPulling="2025-05-10 00:44:59.614130088 +0000 UTC m=+54.048056734" observedRunningTime="2025-05-10 00:45:00.008738691 +0000 UTC m=+54.442665237" watchObservedRunningTime="2025-05-10 00:45:00.71210632 +0000 UTC m=+55.146033166" May 10 00:45:00.732000 audit[4688]: NETFILTER_CFG table=filter:122 family=2 entries=9 op=nft_register_rule pid=4688 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:00.732000 audit[4688]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff3cea4060 a2=0 a3=7fff3cea404c items=0 ppid=2685 pid=4688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:00.732000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:00.736000 audit[4688]: NETFILTER_CFG table=nat:123 family=2 entries=27 op=nft_register_chain pid=4688 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:00.736000 audit[4688]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff3cea4060 a2=0 a3=7fff3cea404c items=0 ppid=2685 pid=4688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:00.736000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:01.589589 env[1417]: time="2025-05-10T00:45:01.589535950Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:01.600436 env[1417]: time="2025-05-10T00:45:01.600397515Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:01.609165 env[1417]: time="2025-05-10T00:45:01.609122167Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:01.614001 env[1417]: time="2025-05-10T00:45:01.613944795Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 10 00:45:01.614487 env[1417]: time="2025-05-10T00:45:01.614440498Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:01.617074 env[1417]: time="2025-05-10T00:45:01.617032714Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:45:01.618035 env[1417]: time="2025-05-10T00:45:01.618001519Z" level=info msg="CreateContainer within sandbox \"e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 10 00:45:01.673700 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount361941004.mount: Deactivated successfully. May 10 00:45:01.681265 env[1417]: time="2025-05-10T00:45:01.681194895Z" level=info msg="CreateContainer within sandbox \"e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"3a1fdd8ae30e5514ba8417a3a5a13f4392d74f0bdc724c15fef5d9a1a840348c\"" May 10 00:45:01.682226 env[1417]: time="2025-05-10T00:45:01.682189000Z" level=info msg="StartContainer for \"3a1fdd8ae30e5514ba8417a3a5a13f4392d74f0bdc724c15fef5d9a1a840348c\"" May 10 00:45:01.708557 systemd[1]: Started cri-containerd-3a1fdd8ae30e5514ba8417a3a5a13f4392d74f0bdc724c15fef5d9a1a840348c.scope. May 10 00:45:01.762000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.762000 audit[4696]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fec3b228218 items=0 ppid=4091 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:01.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361316664643861653330653535313462613834313761336135613133 May 10 00:45:01.762000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.762000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.762000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.762000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.762000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.762000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.762000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.762000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.762000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.762000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.762000 audit: BPF prog-id=198 op=LOAD May 10 00:45:01.762000 audit[4696]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000275d48 items=0 ppid=4091 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:01.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361316664643861653330653535313462613834313761336135613133 May 10 00:45:01.763000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.763000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.763000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.763000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.763000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.763000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.763000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.763000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.763000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.763000 audit: BPF prog-id=199 op=LOAD May 10 00:45:01.763000 audit[4696]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000275d98 items=0 ppid=4091 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:01.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361316664643861653330653535313462613834313761336135613133 May 10 00:45:01.763000 audit: BPF prog-id=199 op=UNLOAD May 10 00:45:01.763000 audit: BPF prog-id=198 op=UNLOAD May 10 00:45:01.763000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.763000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.763000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.763000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.763000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.763000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.763000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.763000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.763000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.763000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.763000 audit: BPF prog-id=200 op=LOAD May 10 00:45:01.763000 audit[4696]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000275e28 items=0 ppid=4091 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:01.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361316664643861653330653535313462613834313761336135613133 May 10 00:45:01.794123 env[1417]: time="2025-05-10T00:45:01.794074465Z" level=info msg="StartContainer for \"3a1fdd8ae30e5514ba8417a3a5a13f4392d74f0bdc724c15fef5d9a1a840348c\" returns successfully" May 10 00:45:01.975011 env[1417]: time="2025-05-10T00:45:01.974965738Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:01.991494 env[1417]: time="2025-05-10T00:45:01.991427236Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:01.997491 env[1417]: time="2025-05-10T00:45:01.997442472Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:02.002877 env[1417]: time="2025-05-10T00:45:02.002827204Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:02.004399 env[1417]: time="2025-05-10T00:45:02.004349912Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:45:02.007348 env[1417]: time="2025-05-10T00:45:02.007316730Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 10 00:45:02.013748 env[1417]: time="2025-05-10T00:45:02.013691667Z" level=info msg="CreateContainer within sandbox \"b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:45:02.066670 env[1417]: time="2025-05-10T00:45:02.066608877Z" level=info msg="CreateContainer within sandbox \"b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e8f7b3e810a3971038a4fc31c0db04b13e131fb2b8f8a1a55edda6bca47b2bdf\"" May 10 00:45:02.067511 env[1417]: time="2025-05-10T00:45:02.067474182Z" level=info msg="StartContainer for \"e8f7b3e810a3971038a4fc31c0db04b13e131fb2b8f8a1a55edda6bca47b2bdf\"" May 10 00:45:02.090032 systemd[1]: Started cri-containerd-e8f7b3e810a3971038a4fc31c0db04b13e131fb2b8f8a1a55edda6bca47b2bdf.scope. May 10 00:45:02.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.116000 audit: BPF prog-id=201 op=LOAD May 10 00:45:02.116000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.116000 audit[4733]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4451 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:02.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538663762336538313061333937313033386134666333316330646230 May 10 00:45:02.116000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.116000 audit[4733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4451 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:02.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538663762336538313061333937313033386134666333316330646230 May 10 00:45:02.116000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.116000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.116000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.116000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.116000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.116000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.116000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.116000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.116000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.116000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.116000 audit: BPF prog-id=202 op=LOAD May 10 00:45:02.116000 audit[4733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001cc160 items=0 ppid=4451 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:02.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538663762336538313061333937313033386134666333316330646230 May 10 00:45:02.117000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.117000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.117000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.117000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.117000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.117000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.117000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.117000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.117000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.117000 audit: BPF prog-id=203 op=LOAD May 10 00:45:02.117000 audit[4733]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001cc1a8 items=0 ppid=4451 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:02.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538663762336538313061333937313033386134666333316330646230 May 10 00:45:02.117000 audit: BPF prog-id=203 op=UNLOAD May 10 00:45:02.117000 audit: BPF prog-id=202 op=UNLOAD May 10 00:45:02.117000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.117000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.117000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.117000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.117000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.117000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.117000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.117000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.117000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.117000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:02.117000 audit: BPF prog-id=204 op=LOAD May 10 00:45:02.117000 audit[4733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001cc5b8 items=0 ppid=4451 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:02.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538663762336538313061333937313033386134666333316330646230 May 10 00:45:02.163231 env[1417]: time="2025-05-10T00:45:02.163087143Z" level=info msg="StartContainer for \"e8f7b3e810a3971038a4fc31c0db04b13e131fb2b8f8a1a55edda6bca47b2bdf\" returns successfully" May 10 00:45:02.302000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8313 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:02.302000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:02.302000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c0082ec900 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:45:02.302000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:45:02.304000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:02.304000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c006c6fbc0 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:45:02.304000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:45:02.302000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c007de12c0 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:45:02.302000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:45:02.323000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8315 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:02.323000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c007de1350 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:45:02.323000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:45:02.328000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:02.329000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8313 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:02.329000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001828e70 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:45:02.329000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:02.328000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001ed6600 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:45:02.328000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:02.364000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8313 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:02.364000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c006c6fec0 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:45:02.364000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:45:02.376000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:02.376000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c007d4ae60 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:45:02.376000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:45:02.668034 systemd[1]: run-containerd-runc-k8s.io-3a1fdd8ae30e5514ba8417a3a5a13f4392d74f0bdc724c15fef5d9a1a840348c-runc.KaTGMV.mount: Deactivated successfully. May 10 00:45:02.797416 kubelet[2528]: I0510 00:45:02.797382 2528 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 10 00:45:02.797416 kubelet[2528]: I0510 00:45:02.797415 2528 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 10 00:45:03.002000 audit[4744]: AVC avc: denied { watch } for pid=4744 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_44_40.4043679354/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c286,c437 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c286,c437 tclass=file permissive=0 May 10 00:45:03.002000 audit[4744]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0014d7dc0 a2=fc6 a3=0 items=0 ppid=4451 pid=4744 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c286,c437 key=(null) May 10 00:45:03.002000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:45:03.009097 kubelet[2528]: I0510 00:45:03.009018 2528 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6f6796fc67-mfm9v" podStartSLOduration=33.578038291 podStartE2EDuration="38.0089912s" podCreationTimestamp="2025-05-10 00:44:25 +0000 UTC" firstStartedPulling="2025-05-10 00:44:57.576096219 +0000 UTC m=+52.010022765" lastFinishedPulling="2025-05-10 00:45:02.007049128 +0000 UTC m=+56.440975674" observedRunningTime="2025-05-10 00:45:03.008781999 +0000 UTC m=+57.442708645" watchObservedRunningTime="2025-05-10 00:45:03.0089912 +0000 UTC m=+57.442917746" May 10 00:45:03.009891 kubelet[2528]: I0510 00:45:03.009781 2528 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-lqtwf" podStartSLOduration=29.567851835 podStartE2EDuration="37.009765605s" podCreationTimestamp="2025-05-10 00:44:26 +0000 UTC" firstStartedPulling="2025-05-10 00:44:54.174184838 +0000 UTC m=+48.608111384" lastFinishedPulling="2025-05-10 00:45:01.616098608 +0000 UTC m=+56.050025154" observedRunningTime="2025-05-10 00:45:02.004101311 +0000 UTC m=+56.438027857" watchObservedRunningTime="2025-05-10 00:45:03.009765605 +0000 UTC m=+57.443692151" May 10 00:45:03.039000 audit[4771]: NETFILTER_CFG table=filter:124 family=2 entries=8 op=nft_register_rule pid=4771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:03.039000 audit[4771]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe155d3250 a2=0 a3=7ffe155d323c items=0 ppid=2685 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:03.039000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:03.047000 audit[4771]: NETFILTER_CFG table=nat:125 family=2 entries=30 op=nft_register_rule pid=4771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:03.047000 audit[4771]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe155d3250 a2=0 a3=7ffe155d323c items=0 ppid=2685 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:03.047000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:03.064000 audit[4773]: NETFILTER_CFG table=filter:126 family=2 entries=8 op=nft_register_rule pid=4773 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:03.064000 audit[4773]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffeddce97e0 a2=0 a3=7ffeddce97cc items=0 ppid=2685 pid=4773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:03.064000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:03.068000 audit[4773]: NETFILTER_CFG table=nat:127 family=2 entries=34 op=nft_register_chain pid=4773 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:03.068000 audit[4773]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffeddce97e0 a2=0 a3=7ffeddce97cc items=0 ppid=2685 pid=4773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:03.068000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:05.675845 env[1417]: time="2025-05-10T00:45:05.675795875Z" level=info msg="StopPodSandbox for \"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\"" May 10 00:45:05.819654 env[1417]: 2025-05-10 00:45:05.736 [WARNING][4791] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0", GenerateName:"calico-apiserver-6f6796fc67-", Namespace:"calico-apiserver", SelfLink:"", UID:"28042a2c-6cae-434f-a489-539111320f12", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6f6796fc67", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca", Pod:"calico-apiserver-6f6796fc67-mfm9v", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.24.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie75307ce15a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:05.819654 env[1417]: 2025-05-10 00:45:05.737 [INFO][4791] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" May 10 00:45:05.819654 env[1417]: 2025-05-10 00:45:05.737 [INFO][4791] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" iface="eth0" netns="" May 10 00:45:05.819654 env[1417]: 2025-05-10 00:45:05.737 [INFO][4791] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" May 10 00:45:05.819654 env[1417]: 2025-05-10 00:45:05.737 [INFO][4791] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" May 10 00:45:05.819654 env[1417]: 2025-05-10 00:45:05.797 [INFO][4798] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" HandleID="k8s-pod-network.51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0" May 10 00:45:05.819654 env[1417]: 2025-05-10 00:45:05.802 [INFO][4798] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:05.819654 env[1417]: 2025-05-10 00:45:05.802 [INFO][4798] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:05.819654 env[1417]: 2025-05-10 00:45:05.814 [WARNING][4798] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" HandleID="k8s-pod-network.51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0" May 10 00:45:05.819654 env[1417]: 2025-05-10 00:45:05.814 [INFO][4798] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" HandleID="k8s-pod-network.51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0" May 10 00:45:05.819654 env[1417]: 2025-05-10 00:45:05.817 [INFO][4798] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:05.819654 env[1417]: 2025-05-10 00:45:05.818 [INFO][4791] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" May 10 00:45:05.820753 env[1417]: time="2025-05-10T00:45:05.820696294Z" level=info msg="TearDown network for sandbox \"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\" successfully" May 10 00:45:05.820906 env[1417]: time="2025-05-10T00:45:05.820878895Z" level=info msg="StopPodSandbox for \"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\" returns successfully" May 10 00:45:05.821717 env[1417]: time="2025-05-10T00:45:05.821680699Z" level=info msg="RemovePodSandbox for \"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\"" May 10 00:45:05.821915 env[1417]: time="2025-05-10T00:45:05.821852200Z" level=info msg="Forcibly stopping sandbox \"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\"" May 10 00:45:05.941152 env[1417]: 2025-05-10 00:45:05.888 [WARNING][4818] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0", GenerateName:"calico-apiserver-6f6796fc67-", Namespace:"calico-apiserver", SelfLink:"", UID:"28042a2c-6cae-434f-a489-539111320f12", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6f6796fc67", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"b04c56831e96ba1a7c911d704d251a7c3d9d0db1d27cdda55e1edc1b2d38c1ca", Pod:"calico-apiserver-6f6796fc67-mfm9v", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.24.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie75307ce15a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:05.941152 env[1417]: 2025-05-10 00:45:05.889 [INFO][4818] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" May 10 00:45:05.941152 env[1417]: 2025-05-10 00:45:05.889 [INFO][4818] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" iface="eth0" netns="" May 10 00:45:05.941152 env[1417]: 2025-05-10 00:45:05.889 [INFO][4818] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" May 10 00:45:05.941152 env[1417]: 2025-05-10 00:45:05.889 [INFO][4818] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" May 10 00:45:05.941152 env[1417]: 2025-05-10 00:45:05.923 [INFO][4825] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" HandleID="k8s-pod-network.51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0" May 10 00:45:05.941152 env[1417]: 2025-05-10 00:45:05.924 [INFO][4825] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:05.941152 env[1417]: 2025-05-10 00:45:05.924 [INFO][4825] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:05.941152 env[1417]: 2025-05-10 00:45:05.936 [WARNING][4825] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" HandleID="k8s-pod-network.51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0" May 10 00:45:05.941152 env[1417]: 2025-05-10 00:45:05.936 [INFO][4825] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" HandleID="k8s-pod-network.51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--mfm9v-eth0" May 10 00:45:05.941152 env[1417]: 2025-05-10 00:45:05.938 [INFO][4825] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:05.941152 env[1417]: 2025-05-10 00:45:05.939 [INFO][4818] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273" May 10 00:45:05.941152 env[1417]: time="2025-05-10T00:45:05.940310370Z" level=info msg="TearDown network for sandbox \"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\" successfully" May 10 00:45:05.948822 env[1417]: time="2025-05-10T00:45:05.948769917Z" level=info msg="RemovePodSandbox \"51af7030fd91651bc35aa04cfd34979362596b7a7f234bc0fe610c830d277273\" returns successfully" May 10 00:45:05.949468 env[1417]: time="2025-05-10T00:45:05.949438421Z" level=info msg="StopPodSandbox for \"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\"" May 10 00:45:06.019509 env[1417]: 2025-05-10 00:45:05.984 [WARNING][4843] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"346b5d8f-193c-4fe4-b4b6-46de7f98db5b", ResourceVersion:"771", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e", Pod:"coredns-7db6d8ff4d-w84t7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.24.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia31eec8f6ac", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:06.019509 env[1417]: 2025-05-10 00:45:05.984 [INFO][4843] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" May 10 00:45:06.019509 env[1417]: 2025-05-10 00:45:05.984 [INFO][4843] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" iface="eth0" netns="" May 10 00:45:06.019509 env[1417]: 2025-05-10 00:45:05.984 [INFO][4843] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" May 10 00:45:06.019509 env[1417]: 2025-05-10 00:45:05.984 [INFO][4843] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" May 10 00:45:06.019509 env[1417]: 2025-05-10 00:45:06.010 [INFO][4851] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" HandleID="k8s-pod-network.2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0" May 10 00:45:06.019509 env[1417]: 2025-05-10 00:45:06.010 [INFO][4851] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:06.019509 env[1417]: 2025-05-10 00:45:06.011 [INFO][4851] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:06.019509 env[1417]: 2025-05-10 00:45:06.015 [WARNING][4851] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" HandleID="k8s-pod-network.2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0" May 10 00:45:06.019509 env[1417]: 2025-05-10 00:45:06.015 [INFO][4851] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" HandleID="k8s-pod-network.2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0" May 10 00:45:06.019509 env[1417]: 2025-05-10 00:45:06.017 [INFO][4851] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:06.019509 env[1417]: 2025-05-10 00:45:06.018 [INFO][4843] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" May 10 00:45:06.020211 env[1417]: time="2025-05-10T00:45:06.019566816Z" level=info msg="TearDown network for sandbox \"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\" successfully" May 10 00:45:06.020211 env[1417]: time="2025-05-10T00:45:06.019607816Z" level=info msg="StopPodSandbox for \"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\" returns successfully" May 10 00:45:06.020354 env[1417]: time="2025-05-10T00:45:06.020239920Z" level=info msg="RemovePodSandbox for \"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\"" May 10 00:45:06.020354 env[1417]: time="2025-05-10T00:45:06.020302120Z" level=info msg="Forcibly stopping sandbox \"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\"" May 10 00:45:06.099218 env[1417]: 2025-05-10 00:45:06.066 [WARNING][4871] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"346b5d8f-193c-4fe4-b4b6-46de7f98db5b", ResourceVersion:"771", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"92ac36507b0a09d894db489f2183680941140e8f254c2235f608df7b9b61b66e", Pod:"coredns-7db6d8ff4d-w84t7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.24.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia31eec8f6ac", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:06.099218 env[1417]: 2025-05-10 00:45:06.067 [INFO][4871] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" May 10 00:45:06.099218 env[1417]: 2025-05-10 00:45:06.067 [INFO][4871] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" iface="eth0" netns="" May 10 00:45:06.099218 env[1417]: 2025-05-10 00:45:06.067 [INFO][4871] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" May 10 00:45:06.099218 env[1417]: 2025-05-10 00:45:06.067 [INFO][4871] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" May 10 00:45:06.099218 env[1417]: 2025-05-10 00:45:06.090 [INFO][4878] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" HandleID="k8s-pod-network.2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0" May 10 00:45:06.099218 env[1417]: 2025-05-10 00:45:06.090 [INFO][4878] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:06.099218 env[1417]: 2025-05-10 00:45:06.090 [INFO][4878] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:06.099218 env[1417]: 2025-05-10 00:45:06.095 [WARNING][4878] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" HandleID="k8s-pod-network.2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0" May 10 00:45:06.099218 env[1417]: 2025-05-10 00:45:06.095 [INFO][4878] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" HandleID="k8s-pod-network.2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--w84t7-eth0" May 10 00:45:06.099218 env[1417]: 2025-05-10 00:45:06.097 [INFO][4878] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:06.099218 env[1417]: 2025-05-10 00:45:06.098 [INFO][4871] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d" May 10 00:45:06.099945 env[1417]: time="2025-05-10T00:45:06.099266261Z" level=info msg="TearDown network for sandbox \"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\" successfully" May 10 00:45:06.113887 env[1417]: time="2025-05-10T00:45:06.113807443Z" level=info msg="RemovePodSandbox \"2fc69ceded26815aa48b2894248419e3399593aadade950d8e6f3000c78cb72d\" returns successfully" May 10 00:45:06.114618 env[1417]: time="2025-05-10T00:45:06.114584747Z" level=info msg="StopPodSandbox for \"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\"" May 10 00:45:06.218980 env[1417]: 2025-05-10 00:45:06.169 [WARNING][4896] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0", GenerateName:"calico-kube-controllers-d465f4dc7-", Namespace:"calico-system", SelfLink:"", UID:"283e0cc9-b0f3-4c21-b09c-2a9c6cb13ecb", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"d465f4dc7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08", Pod:"calico-kube-controllers-d465f4dc7-tgv6g", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.24.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif73350d27f1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:06.218980 env[1417]: 2025-05-10 00:45:06.169 [INFO][4896] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" May 10 00:45:06.218980 env[1417]: 2025-05-10 00:45:06.169 [INFO][4896] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" iface="eth0" netns="" May 10 00:45:06.218980 env[1417]: 2025-05-10 00:45:06.169 [INFO][4896] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" May 10 00:45:06.218980 env[1417]: 2025-05-10 00:45:06.169 [INFO][4896] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" May 10 00:45:06.218980 env[1417]: 2025-05-10 00:45:06.207 [INFO][4903] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" HandleID="k8s-pod-network.748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0" May 10 00:45:06.218980 env[1417]: 2025-05-10 00:45:06.208 [INFO][4903] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:06.218980 env[1417]: 2025-05-10 00:45:06.208 [INFO][4903] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:06.218980 env[1417]: 2025-05-10 00:45:06.214 [WARNING][4903] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" HandleID="k8s-pod-network.748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0" May 10 00:45:06.218980 env[1417]: 2025-05-10 00:45:06.215 [INFO][4903] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" HandleID="k8s-pod-network.748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0" May 10 00:45:06.218980 env[1417]: 2025-05-10 00:45:06.216 [INFO][4903] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:06.218980 env[1417]: 2025-05-10 00:45:06.217 [INFO][4896] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" May 10 00:45:06.219870 env[1417]: time="2025-05-10T00:45:06.219817335Z" level=info msg="TearDown network for sandbox \"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\" successfully" May 10 00:45:06.219993 env[1417]: time="2025-05-10T00:45:06.219969436Z" level=info msg="StopPodSandbox for \"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\" returns successfully" May 10 00:45:06.220855 env[1417]: time="2025-05-10T00:45:06.220825840Z" level=info msg="RemovePodSandbox for \"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\"" May 10 00:45:06.221074 env[1417]: time="2025-05-10T00:45:06.221017141Z" level=info msg="Forcibly stopping sandbox \"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\"" May 10 00:45:06.337610 env[1417]: 2025-05-10 00:45:06.270 [WARNING][4924] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0", GenerateName:"calico-kube-controllers-d465f4dc7-", Namespace:"calico-system", SelfLink:"", UID:"283e0cc9-b0f3-4c21-b09c-2a9c6cb13ecb", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"d465f4dc7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08", Pod:"calico-kube-controllers-d465f4dc7-tgv6g", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.24.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif73350d27f1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:06.337610 env[1417]: 2025-05-10 00:45:06.270 [INFO][4924] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" May 10 00:45:06.337610 env[1417]: 2025-05-10 00:45:06.270 [INFO][4924] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" iface="eth0" netns="" May 10 00:45:06.337610 env[1417]: 2025-05-10 00:45:06.270 [INFO][4924] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" May 10 00:45:06.337610 env[1417]: 2025-05-10 00:45:06.270 [INFO][4924] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" May 10 00:45:06.337610 env[1417]: 2025-05-10 00:45:06.325 [INFO][4931] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" HandleID="k8s-pod-network.748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0" May 10 00:45:06.337610 env[1417]: 2025-05-10 00:45:06.326 [INFO][4931] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:06.337610 env[1417]: 2025-05-10 00:45:06.326 [INFO][4931] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:06.337610 env[1417]: 2025-05-10 00:45:06.332 [WARNING][4931] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" HandleID="k8s-pod-network.748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0" May 10 00:45:06.337610 env[1417]: 2025-05-10 00:45:06.333 [INFO][4931] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" HandleID="k8s-pod-network.748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--kube--controllers--d465f4dc7--tgv6g-eth0" May 10 00:45:06.337610 env[1417]: 2025-05-10 00:45:06.334 [INFO][4931] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:06.337610 env[1417]: 2025-05-10 00:45:06.336 [INFO][4924] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65" May 10 00:45:06.338481 env[1417]: time="2025-05-10T00:45:06.338420697Z" level=info msg="TearDown network for sandbox \"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\" successfully" May 10 00:45:06.354511 env[1417]: time="2025-05-10T00:45:06.354459187Z" level=info msg="RemovePodSandbox \"748fed2cec161f1c7abe9ac92d9651b0e956cf04738afcfa8fe2429d09df9c65\" returns successfully" May 10 00:45:06.355365 env[1417]: time="2025-05-10T00:45:06.355326692Z" level=info msg="StopPodSandbox for \"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\"" May 10 00:45:06.460003 env[1417]: 2025-05-10 00:45:06.413 [WARNING][4952] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0", GenerateName:"calico-apiserver-6f6796fc67-", Namespace:"calico-apiserver", SelfLink:"", UID:"5c5ae991-5c69-4151-badb-79442d925e88", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6f6796fc67", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3", Pod:"calico-apiserver-6f6796fc67-z4mcn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.24.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4f8ebb2009d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:06.460003 env[1417]: 2025-05-10 00:45:06.414 [INFO][4952] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" May 10 00:45:06.460003 env[1417]: 2025-05-10 00:45:06.414 [INFO][4952] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" iface="eth0" netns="" May 10 00:45:06.460003 env[1417]: 2025-05-10 00:45:06.414 [INFO][4952] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" May 10 00:45:06.460003 env[1417]: 2025-05-10 00:45:06.414 [INFO][4952] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" May 10 00:45:06.460003 env[1417]: 2025-05-10 00:45:06.445 [INFO][4960] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" HandleID="k8s-pod-network.cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0" May 10 00:45:06.460003 env[1417]: 2025-05-10 00:45:06.445 [INFO][4960] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:06.460003 env[1417]: 2025-05-10 00:45:06.446 [INFO][4960] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:06.460003 env[1417]: 2025-05-10 00:45:06.454 [WARNING][4960] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" HandleID="k8s-pod-network.cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0" May 10 00:45:06.460003 env[1417]: 2025-05-10 00:45:06.455 [INFO][4960] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" HandleID="k8s-pod-network.cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0" May 10 00:45:06.460003 env[1417]: 2025-05-10 00:45:06.458 [INFO][4960] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:06.460003 env[1417]: 2025-05-10 00:45:06.459 [INFO][4952] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" May 10 00:45:06.460703 env[1417]: time="2025-05-10T00:45:06.460041376Z" level=info msg="TearDown network for sandbox \"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\" successfully" May 10 00:45:06.460703 env[1417]: time="2025-05-10T00:45:06.460078877Z" level=info msg="StopPodSandbox for \"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\" returns successfully" May 10 00:45:06.460786 env[1417]: time="2025-05-10T00:45:06.460695380Z" level=info msg="RemovePodSandbox for \"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\"" May 10 00:45:06.460786 env[1417]: time="2025-05-10T00:45:06.460734380Z" level=info msg="Forcibly stopping sandbox \"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\"" May 10 00:45:06.533463 env[1417]: 2025-05-10 00:45:06.498 [WARNING][4978] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0", GenerateName:"calico-apiserver-6f6796fc67-", Namespace:"calico-apiserver", SelfLink:"", UID:"5c5ae991-5c69-4151-badb-79442d925e88", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6f6796fc67", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"e05dcbb207146eb110c9ad47e284330dcad022dc819e4cc22b95cd442b5f49a3", Pod:"calico-apiserver-6f6796fc67-z4mcn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.24.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4f8ebb2009d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:06.533463 env[1417]: 2025-05-10 00:45:06.498 [INFO][4978] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" May 10 00:45:06.533463 env[1417]: 2025-05-10 00:45:06.498 [INFO][4978] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" iface="eth0" netns="" May 10 00:45:06.533463 env[1417]: 2025-05-10 00:45:06.498 [INFO][4978] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" May 10 00:45:06.533463 env[1417]: 2025-05-10 00:45:06.498 [INFO][4978] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" May 10 00:45:06.533463 env[1417]: 2025-05-10 00:45:06.522 [INFO][4985] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" HandleID="k8s-pod-network.cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0" May 10 00:45:06.533463 env[1417]: 2025-05-10 00:45:06.522 [INFO][4985] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:06.533463 env[1417]: 2025-05-10 00:45:06.523 [INFO][4985] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:06.533463 env[1417]: 2025-05-10 00:45:06.528 [WARNING][4985] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" HandleID="k8s-pod-network.cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0" May 10 00:45:06.533463 env[1417]: 2025-05-10 00:45:06.528 [INFO][4985] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" HandleID="k8s-pod-network.cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" Workload="ci--3510.3.7--n--d5b055839e-k8s-calico--apiserver--6f6796fc67--z4mcn-eth0" May 10 00:45:06.533463 env[1417]: 2025-05-10 00:45:06.530 [INFO][4985] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:06.533463 env[1417]: 2025-05-10 00:45:06.531 [INFO][4978] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010" May 10 00:45:06.533463 env[1417]: time="2025-05-10T00:45:06.533412186Z" level=info msg="TearDown network for sandbox \"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\" successfully" May 10 00:45:06.550012 env[1417]: time="2025-05-10T00:45:06.549946879Z" level=info msg="RemovePodSandbox \"cfe73000c72d2bf2a8ec766fc2917d43ace78260accaf49f4e73abc3a767e010\" returns successfully" May 10 00:45:06.550768 env[1417]: time="2025-05-10T00:45:06.550735383Z" level=info msg="StopPodSandbox for \"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\"" May 10 00:45:06.655875 env[1417]: 2025-05-10 00:45:06.616 [WARNING][5004] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c60a92a9-8c7e-46c2-9455-69880570e281", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c", Pod:"csi-node-driver-lqtwf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.24.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie57eaec5849", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:06.655875 env[1417]: 2025-05-10 00:45:06.616 [INFO][5004] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" May 10 00:45:06.655875 env[1417]: 2025-05-10 00:45:06.616 [INFO][5004] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" iface="eth0" netns="" May 10 00:45:06.655875 env[1417]: 2025-05-10 00:45:06.616 [INFO][5004] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" May 10 00:45:06.655875 env[1417]: 2025-05-10 00:45:06.616 [INFO][5004] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" May 10 00:45:06.655875 env[1417]: 2025-05-10 00:45:06.640 [INFO][5011] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" HandleID="k8s-pod-network.46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" Workload="ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0" May 10 00:45:06.655875 env[1417]: 2025-05-10 00:45:06.641 [INFO][5011] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:06.655875 env[1417]: 2025-05-10 00:45:06.641 [INFO][5011] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:06.655875 env[1417]: 2025-05-10 00:45:06.652 [WARNING][5011] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" HandleID="k8s-pod-network.46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" Workload="ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0" May 10 00:45:06.655875 env[1417]: 2025-05-10 00:45:06.652 [INFO][5011] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" HandleID="k8s-pod-network.46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" Workload="ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0" May 10 00:45:06.655875 env[1417]: 2025-05-10 00:45:06.653 [INFO][5011] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:06.655875 env[1417]: 2025-05-10 00:45:06.654 [INFO][5004] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" May 10 00:45:06.656682 env[1417]: time="2025-05-10T00:45:06.655919570Z" level=info msg="TearDown network for sandbox \"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\" successfully" May 10 00:45:06.656682 env[1417]: time="2025-05-10T00:45:06.655962771Z" level=info msg="StopPodSandbox for \"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\" returns successfully" May 10 00:45:06.656682 env[1417]: time="2025-05-10T00:45:06.656552174Z" level=info msg="RemovePodSandbox for \"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\"" May 10 00:45:06.656682 env[1417]: time="2025-05-10T00:45:06.656592874Z" level=info msg="Forcibly stopping sandbox \"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\"" May 10 00:45:06.725544 env[1417]: 2025-05-10 00:45:06.692 [WARNING][5030] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c60a92a9-8c7e-46c2-9455-69880570e281", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"e77744ec98e48f9cf4edc18e742d02415d9dd9049bee09ed9abeb35c8baf2f3c", Pod:"csi-node-driver-lqtwf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.24.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie57eaec5849", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:06.725544 env[1417]: 2025-05-10 00:45:06.692 [INFO][5030] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" May 10 00:45:06.725544 env[1417]: 2025-05-10 00:45:06.692 [INFO][5030] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" iface="eth0" netns="" May 10 00:45:06.725544 env[1417]: 2025-05-10 00:45:06.692 [INFO][5030] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" May 10 00:45:06.725544 env[1417]: 2025-05-10 00:45:06.693 [INFO][5030] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" May 10 00:45:06.725544 env[1417]: 2025-05-10 00:45:06.713 [INFO][5037] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" HandleID="k8s-pod-network.46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" Workload="ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0" May 10 00:45:06.725544 env[1417]: 2025-05-10 00:45:06.713 [INFO][5037] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:06.725544 env[1417]: 2025-05-10 00:45:06.713 [INFO][5037] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:06.725544 env[1417]: 2025-05-10 00:45:06.721 [WARNING][5037] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" HandleID="k8s-pod-network.46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" Workload="ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0" May 10 00:45:06.725544 env[1417]: 2025-05-10 00:45:06.721 [INFO][5037] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" HandleID="k8s-pod-network.46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" Workload="ci--3510.3.7--n--d5b055839e-k8s-csi--node--driver--lqtwf-eth0" May 10 00:45:06.725544 env[1417]: 2025-05-10 00:45:06.723 [INFO][5037] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:06.725544 env[1417]: 2025-05-10 00:45:06.724 [INFO][5030] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb" May 10 00:45:06.726750 env[1417]: time="2025-05-10T00:45:06.725584660Z" level=info msg="TearDown network for sandbox \"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\" successfully" May 10 00:45:06.739609 env[1417]: time="2025-05-10T00:45:06.739482837Z" level=info msg="RemovePodSandbox \"46d9991a26b3cc3b51015de860baeac47bc56989ee284d7a5249d5f3a55a68fb\" returns successfully" May 10 00:45:06.740175 env[1417]: time="2025-05-10T00:45:06.740136041Z" level=info msg="StopPodSandbox for \"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\"" May 10 00:45:06.868912 env[1417]: 2025-05-10 00:45:06.808 [WARNING][5056] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"34f77ccb-223c-4aec-af9c-f1311dfd9100", ResourceVersion:"817", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d", Pod:"coredns-7db6d8ff4d-4b7hx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.24.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calife31a610a0c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:06.868912 env[1417]: 2025-05-10 00:45:06.808 [INFO][5056] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" May 10 00:45:06.868912 env[1417]: 2025-05-10 00:45:06.808 [INFO][5056] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" iface="eth0" netns="" May 10 00:45:06.868912 env[1417]: 2025-05-10 00:45:06.808 [INFO][5056] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" May 10 00:45:06.868912 env[1417]: 2025-05-10 00:45:06.808 [INFO][5056] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" May 10 00:45:06.868912 env[1417]: 2025-05-10 00:45:06.849 [INFO][5063] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" HandleID="k8s-pod-network.7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0" May 10 00:45:06.868912 env[1417]: 2025-05-10 00:45:06.850 [INFO][5063] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:06.868912 env[1417]: 2025-05-10 00:45:06.850 [INFO][5063] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:06.868912 env[1417]: 2025-05-10 00:45:06.865 [WARNING][5063] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" HandleID="k8s-pod-network.7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0" May 10 00:45:06.868912 env[1417]: 2025-05-10 00:45:06.865 [INFO][5063] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" HandleID="k8s-pod-network.7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0" May 10 00:45:06.868912 env[1417]: 2025-05-10 00:45:06.866 [INFO][5063] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:06.868912 env[1417]: 2025-05-10 00:45:06.867 [INFO][5056] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" May 10 00:45:06.868912 env[1417]: time="2025-05-10T00:45:06.868875260Z" level=info msg="TearDown network for sandbox \"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\" successfully" May 10 00:45:06.869656 env[1417]: time="2025-05-10T00:45:06.868914960Z" level=info msg="StopPodSandbox for \"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\" returns successfully" May 10 00:45:06.869656 env[1417]: time="2025-05-10T00:45:06.869459763Z" level=info msg="RemovePodSandbox for \"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\"" May 10 00:45:06.869656 env[1417]: time="2025-05-10T00:45:06.869496463Z" level=info msg="Forcibly stopping sandbox \"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\"" May 10 00:45:06.966009 env[1417]: 2025-05-10 00:45:06.929 [WARNING][5082] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"34f77ccb-223c-4aec-af9c-f1311dfd9100", ResourceVersion:"817", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-d5b055839e", ContainerID:"347727690f56f70eb70d4bf61970ffde120545e076ecd9bc50594ead59ce554d", Pod:"coredns-7db6d8ff4d-4b7hx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.24.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calife31a610a0c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:06.966009 env[1417]: 2025-05-10 00:45:06.930 [INFO][5082] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" May 10 00:45:06.966009 env[1417]: 2025-05-10 00:45:06.930 [INFO][5082] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" iface="eth0" netns="" May 10 00:45:06.966009 env[1417]: 2025-05-10 00:45:06.930 [INFO][5082] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" May 10 00:45:06.966009 env[1417]: 2025-05-10 00:45:06.930 [INFO][5082] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" May 10 00:45:06.966009 env[1417]: 2025-05-10 00:45:06.957 [INFO][5089] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" HandleID="k8s-pod-network.7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0" May 10 00:45:06.966009 env[1417]: 2025-05-10 00:45:06.957 [INFO][5089] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:06.966009 env[1417]: 2025-05-10 00:45:06.957 [INFO][5089] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:06.966009 env[1417]: 2025-05-10 00:45:06.962 [WARNING][5089] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" HandleID="k8s-pod-network.7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0" May 10 00:45:06.966009 env[1417]: 2025-05-10 00:45:06.962 [INFO][5089] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" HandleID="k8s-pod-network.7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" Workload="ci--3510.3.7--n--d5b055839e-k8s-coredns--7db6d8ff4d--4b7hx-eth0" May 10 00:45:06.966009 env[1417]: 2025-05-10 00:45:06.964 [INFO][5089] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:06.966009 env[1417]: 2025-05-10 00:45:06.965 [INFO][5082] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918" May 10 00:45:06.966747 env[1417]: time="2025-05-10T00:45:06.966051403Z" level=info msg="TearDown network for sandbox \"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\" successfully" May 10 00:45:06.981493 env[1417]: time="2025-05-10T00:45:06.981423388Z" level=info msg="RemovePodSandbox \"7f97d6e51207121cc1dbcfabe8f831c1b74ff211cb65a3f11a31cdd326c08918\" returns successfully" May 10 00:45:07.103000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:07.109963 kernel: kauditd_printk_skb: 201 callbacks suppressed May 10 00:45:07.110621 kernel: audit: type=1400 audit(1746837907.103:1344): avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:07.103000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0021a1480 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:45:07.165510 kernel: audit: type=1300 audit(1746837907.103:1344): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0021a1480 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:45:07.103000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:07.218305 kernel: audit: type=1327 audit(1746837907.103:1344): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:07.218450 kernel: audit: type=1400 audit(1746837907.106:1345): avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:07.106000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:07.106000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0021a14a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:45:07.106000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:07.298066 kernel: audit: type=1300 audit(1746837907.106:1345): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0021a14a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:45:07.299033 kernel: audit: type=1327 audit(1746837907.106:1345): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:07.299963 kernel: audit: type=1400 audit(1746837907.107:1346): avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:07.107000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:07.107000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0021a14c0 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:45:07.343891 kernel: audit: type=1300 audit(1746837907.107:1346): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0021a14c0 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:45:07.107000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:07.114000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:07.380361 kernel: audit: type=1327 audit(1746837907.107:1346): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:07.380533 kernel: audit: type=1400 audit(1746837907.114:1347): avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:07.114000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002004700 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:45:07.114000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:24.287826 env[1417]: time="2025-05-10T00:45:24.287769609Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:24.295319 env[1417]: time="2025-05-10T00:45:24.295195744Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:24.301131 env[1417]: time="2025-05-10T00:45:24.301077171Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:24.306454 env[1417]: time="2025-05-10T00:45:24.306397396Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:24.307227 env[1417]: time="2025-05-10T00:45:24.307189800Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 10 00:45:24.334516 env[1417]: time="2025-05-10T00:45:24.334471428Z" level=info msg="CreateContainer within sandbox \"69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 10 00:45:24.368178 env[1417]: time="2025-05-10T00:45:24.368121987Z" level=info msg="CreateContainer within sandbox \"69a8224bd9d9b1a6af1c65aefa129b95ad271ef693ac7569e388e80f19b62b08\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"346af08ddb070fb30d68bc8f1fed645790ba01d00b39c6b5a912b521f14a2723\"" May 10 00:45:24.369079 env[1417]: time="2025-05-10T00:45:24.369045791Z" level=info msg="StartContainer for \"346af08ddb070fb30d68bc8f1fed645790ba01d00b39c6b5a912b521f14a2723\"" May 10 00:45:24.396757 systemd[1]: Started cri-containerd-346af08ddb070fb30d68bc8f1fed645790ba01d00b39c6b5a912b521f14a2723.scope. May 10 00:45:24.418457 kernel: kauditd_printk_skb: 2 callbacks suppressed May 10 00:45:24.418605 kernel: audit: type=1400 audit(1746837924.412:1348): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.462512 kernel: audit: type=1400 audit(1746837924.412:1349): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.462674 kernel: audit: type=1400 audit(1746837924.412:1350): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.477186 kernel: audit: type=1400 audit(1746837924.412:1351): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.515682 kernel: audit: type=1400 audit(1746837924.412:1352): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.515858 kernel: audit: type=1400 audit(1746837924.412:1353): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.529714 kernel: audit: type=1400 audit(1746837924.412:1354): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.549449 kernel: audit: type=1400 audit(1746837924.412:1355): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.564474 kernel: audit: type=1400 audit(1746837924.412:1356): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.580757 kernel: audit: type=1400 audit(1746837924.416:1357): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.416000 audit: BPF prog-id=205 op=LOAD May 10 00:45:24.416000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.416000 audit[5118]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4613 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:24.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334366166303864646230373066623330643638626338663166656436 May 10 00:45:24.416000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.416000 audit[5118]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4613 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:24.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334366166303864646230373066623330643638626338663166656436 May 10 00:45:24.416000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.416000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.416000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.416000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.416000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.416000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.416000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.416000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.416000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.416000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.416000 audit: BPF prog-id=206 op=LOAD May 10 00:45:24.416000 audit[5118]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003b81b0 items=0 ppid=4613 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:24.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334366166303864646230373066623330643638626338663166656436 May 10 00:45:24.431000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.431000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.431000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.431000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.431000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.431000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.431000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.431000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.431000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.431000 audit: BPF prog-id=207 op=LOAD May 10 00:45:24.431000 audit[5118]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003b81f8 items=0 ppid=4613 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:24.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334366166303864646230373066623330643638626338663166656436 May 10 00:45:24.431000 audit: BPF prog-id=207 op=UNLOAD May 10 00:45:24.431000 audit: BPF prog-id=206 op=UNLOAD May 10 00:45:24.431000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.431000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.431000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.431000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.431000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.431000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.431000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.431000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.431000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.431000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.431000 audit: BPF prog-id=208 op=LOAD May 10 00:45:24.431000 audit[5118]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003b8608 items=0 ppid=4613 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:24.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334366166303864646230373066623330643638626338663166656436 May 10 00:45:24.589185 env[1417]: time="2025-05-10T00:45:24.589131425Z" level=info msg="StartContainer for \"346af08ddb070fb30d68bc8f1fed645790ba01d00b39c6b5a912b521f14a2723\" returns successfully" May 10 00:45:25.152365 kubelet[2528]: I0510 00:45:25.151419 2528 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-d465f4dc7-tgv6g" podStartSLOduration=33.554977124 podStartE2EDuration="59.151390562s" podCreationTimestamp="2025-05-10 00:44:26 +0000 UTC" firstStartedPulling="2025-05-10 00:44:58.711943568 +0000 UTC m=+53.145870214" lastFinishedPulling="2025-05-10 00:45:24.308357106 +0000 UTC m=+78.742283652" observedRunningTime="2025-05-10 00:45:25.103502938 +0000 UTC m=+79.537429584" watchObservedRunningTime="2025-05-10 00:45:25.151390562 +0000 UTC m=+79.585317108" May 10 00:45:40.368354 systemd[1]: run-containerd-runc-k8s.io-346af08ddb070fb30d68bc8f1fed645790ba01d00b39c6b5a912b521f14a2723-runc.K7STR3.mount: Deactivated successfully. May 10 00:45:56.801595 systemd[1]: run-containerd-runc-k8s.io-82ce7916b01a4e43bb5b528f1228da214814a19205c14597435f0ea4161db6d7-runc.ndQ3ed.mount: Deactivated successfully. May 10 00:46:00.691000 audit[4665]: AVC avc: denied { watch } for pid=4665 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_44_40.169962964/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c436,c851 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c436,c851 tclass=file permissive=0 May 10 00:46:00.697432 kernel: kauditd_printk_skb: 47 callbacks suppressed May 10 00:46:00.697536 kernel: audit: type=1400 audit(1746837960.691:1366): avc: denied { watch } for pid=4665 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_44_40.169962964/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c436,c851 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c436,c851 tclass=file permissive=0 May 10 00:46:00.691000 audit[4665]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000682080 a2=fc6 a3=0 items=0 ppid=4193 pid=4665 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c436,c851 key=(null) May 10 00:46:00.743909 kernel: audit: type=1300 audit(1746837960.691:1366): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000682080 a2=fc6 a3=0 items=0 ppid=4193 pid=4665 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c436,c851 key=(null) May 10 00:46:00.744003 kernel: audit: type=1327 audit(1746837960.691:1366): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:46:00.691000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:46:02.304000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:02.304000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c005dc46a0 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:46:02.339924 kernel: audit: type=1400 audit(1746837962.304:1367): avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:02.340046 kernel: audit: type=1300 audit(1746837962.304:1367): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c005dc46a0 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:46:02.340072 kernel: audit: type=1327 audit(1746837962.304:1367): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:46:02.304000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:46:02.319000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:02.380040 kernel: audit: type=1400 audit(1746837962.319:1368): avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:02.380180 kernel: audit: type=1300 audit(1746837962.319:1368): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c006acb080 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:46:02.319000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c006acb080 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:46:02.319000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:46:02.320000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8313 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:02.431841 kernel: audit: type=1327 audit(1746837962.319:1368): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:46:02.431938 kernel: audit: type=1400 audit(1746837962.320:1369): avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8313 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:02.320000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c006acb1a0 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:46:02.320000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:46:02.324000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8315 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:02.324000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c006acb260 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:46:02.324000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:46:02.330000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8313 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:02.330000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002e70cc0 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:46:02.330000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:02.330000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:02.330000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0031b1fc0 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:46:02.330000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:02.365000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8313 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:02.365000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c006acb350 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:46:02.365000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:46:02.378000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:02.378000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c004877480 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:46:02.378000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:46:03.003000 audit[4744]: AVC avc: denied { watch } for pid=4744 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_44_40.4043679354/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c286,c437 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c286,c437 tclass=file permissive=0 May 10 00:46:03.003000 audit[4744]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002570d60 a2=fc6 a3=0 items=0 ppid=4451 pid=4744 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c286,c437 key=(null) May 10 00:46:03.003000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:46:07.106000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:07.112287 kernel: kauditd_printk_skb: 20 callbacks suppressed May 10 00:46:07.112407 kernel: audit: type=1400 audit(1746837967.106:1376): avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:07.106000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:07.144293 kernel: audit: type=1400 audit(1746837967.106:1377): avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:07.106000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0032fc180 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:46:07.164440 kernel: audit: type=1300 audit(1746837967.106:1377): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0032fc180 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:46:07.106000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:07.185846 kernel: audit: type=1327 audit(1746837967.106:1377): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:07.185955 kernel: audit: type=1400 audit(1746837967.108:1378): avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:07.108000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:07.108000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0032fc320 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:46:07.224949 kernel: audit: type=1300 audit(1746837967.108:1378): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0032fc320 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:46:07.225080 kernel: audit: type=1327 audit(1746837967.108:1378): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:07.108000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:07.106000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00312bd20 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:46:07.262200 kernel: audit: type=1300 audit(1746837967.106:1376): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00312bd20 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:46:07.262314 kernel: audit: type=1327 audit(1746837967.106:1376): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:07.106000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:07.114000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:07.293311 kernel: audit: type=1400 audit(1746837967.114:1379): avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:07.114000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00312bd40 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:46:07.114000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:10.366988 systemd[1]: run-containerd-runc-k8s.io-346af08ddb070fb30d68bc8f1fed645790ba01d00b39c6b5a912b521f14a2723-runc.7tCKMN.mount: Deactivated successfully. May 10 00:46:20.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.40:22-10.200.16.10:57928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:20.064670 systemd[1]: Started sshd@7-10.200.8.40:22-10.200.16.10:57928.service. May 10 00:46:20.072574 kernel: kauditd_printk_skb: 2 callbacks suppressed May 10 00:46:20.072680 kernel: audit: type=1130 audit(1746837980.063:1380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.40:22-10.200.16.10:57928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:20.705000 audit[5273]: USER_ACCT pid=5273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:20.726480 kernel: audit: type=1101 audit(1746837980.705:1381): pid=5273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:20.726532 sshd[5273]: Accepted publickey for core from 10.200.16.10 port 57928 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:46:20.726395 sshd[5273]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:20.706000 audit[5273]: CRED_ACQ pid=5273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:20.739776 systemd-logind[1398]: New session 10 of user core. May 10 00:46:20.741938 systemd[1]: Started session-10.scope. May 10 00:46:20.749263 kernel: audit: type=1103 audit(1746837980.706:1382): pid=5273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:20.706000 audit[5273]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf08aeba0 a2=3 a3=0 items=0 ppid=1 pid=5273 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:20.760308 kernel: audit: type=1006 audit(1746837980.706:1383): pid=5273 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 10 00:46:20.760352 kernel: audit: type=1300 audit(1746837980.706:1383): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf08aeba0 a2=3 a3=0 items=0 ppid=1 pid=5273 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:20.706000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:20.786486 kernel: audit: type=1327 audit(1746837980.706:1383): proctitle=737368643A20636F7265205B707269765D May 10 00:46:20.786591 kernel: audit: type=1105 audit(1746837980.749:1384): pid=5273 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:20.749000 audit[5273]: USER_START pid=5273 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:20.752000 audit[5294]: CRED_ACQ pid=5294 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:20.804338 kernel: audit: type=1103 audit(1746837980.752:1385): pid=5294 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:21.255449 sshd[5273]: pam_unix(sshd:session): session closed for user core May 10 00:46:21.255000 audit[5273]: USER_END pid=5273 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:21.259445 systemd[1]: sshd@7-10.200.8.40:22-10.200.16.10:57928.service: Deactivated successfully. May 10 00:46:21.260385 systemd[1]: session-10.scope: Deactivated successfully. May 10 00:46:21.262126 systemd-logind[1398]: Session 10 logged out. Waiting for processes to exit. May 10 00:46:21.263175 systemd-logind[1398]: Removed session 10. May 10 00:46:21.255000 audit[5273]: CRED_DISP pid=5273 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:21.290621 kernel: audit: type=1106 audit(1746837981.255:1386): pid=5273 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:21.290763 kernel: audit: type=1104 audit(1746837981.255:1387): pid=5273 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:21.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.40:22-10.200.16.10:57928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:26.363189 systemd[1]: Started sshd@8-10.200.8.40:22-10.200.16.10:57932.service. May 10 00:46:26.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.40:22-10.200.16.10:57932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:26.369317 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:46:26.369395 kernel: audit: type=1130 audit(1746837986.362:1389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.40:22-10.200.16.10:57932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:26.791148 systemd[1]: run-containerd-runc-k8s.io-82ce7916b01a4e43bb5b528f1228da214814a19205c14597435f0ea4161db6d7-runc.WZqMCT.mount: Deactivated successfully. May 10 00:46:27.004000 audit[5317]: USER_ACCT pid=5317 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:27.024489 kernel: audit: type=1101 audit(1746837987.004:1390): pid=5317 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:27.024548 sshd[5317]: Accepted publickey for core from 10.200.16.10 port 57932 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:46:27.024944 sshd[5317]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:27.023000 audit[5317]: CRED_ACQ pid=5317 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:27.033106 systemd[1]: Started session-11.scope. May 10 00:46:27.034331 systemd-logind[1398]: New session 11 of user core. May 10 00:46:27.061354 kernel: audit: type=1103 audit(1746837987.023:1391): pid=5317 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:27.061514 kernel: audit: type=1006 audit(1746837987.023:1392): pid=5317 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 10 00:46:27.061543 kernel: audit: type=1300 audit(1746837987.023:1392): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebac4f180 a2=3 a3=0 items=0 ppid=1 pid=5317 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.023000 audit[5317]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebac4f180 a2=3 a3=0 items=0 ppid=1 pid=5317 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.023000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:27.039000 audit[5317]: USER_START pid=5317 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:27.120189 kernel: audit: type=1327 audit(1746837987.023:1392): proctitle=737368643A20636F7265205B707269765D May 10 00:46:27.120408 kernel: audit: type=1105 audit(1746837987.039:1393): pid=5317 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:27.120452 kernel: audit: type=1103 audit(1746837987.041:1394): pid=5339 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:27.041000 audit[5339]: CRED_ACQ pid=5339 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:27.517199 sshd[5317]: pam_unix(sshd:session): session closed for user core May 10 00:46:27.517000 audit[5317]: USER_END pid=5317 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:27.521473 systemd[1]: sshd@8-10.200.8.40:22-10.200.16.10:57932.service: Deactivated successfully. May 10 00:46:27.527929 systemd[1]: session-11.scope: Deactivated successfully. May 10 00:46:27.529219 systemd-logind[1398]: Session 11 logged out. Waiting for processes to exit. May 10 00:46:27.530137 systemd-logind[1398]: Removed session 11. May 10 00:46:27.518000 audit[5317]: CRED_DISP pid=5317 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:27.565456 kernel: audit: type=1106 audit(1746837987.517:1395): pid=5317 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:27.565637 kernel: audit: type=1104 audit(1746837987.518:1396): pid=5317 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:27.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.40:22-10.200.16.10:57932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:32.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.40:22-10.200.16.10:42518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:32.624736 systemd[1]: Started sshd@9-10.200.8.40:22-10.200.16.10:42518.service. May 10 00:46:32.630443 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:46:32.630533 kernel: audit: type=1130 audit(1746837992.623:1398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.40:22-10.200.16.10:42518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:33.265000 audit[5355]: USER_ACCT pid=5355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:33.266341 sshd[5355]: Accepted publickey for core from 10.200.16.10 port 42518 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:46:33.283000 audit[5355]: CRED_ACQ pid=5355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:33.284664 sshd[5355]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:33.293937 systemd[1]: Started session-12.scope. May 10 00:46:33.295042 systemd-logind[1398]: New session 12 of user core. May 10 00:46:33.303861 kernel: audit: type=1101 audit(1746837993.265:1399): pid=5355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:33.303929 kernel: audit: type=1103 audit(1746837993.283:1400): pid=5355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:33.303960 kernel: audit: type=1006 audit(1746837993.283:1401): pid=5355 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 10 00:46:33.283000 audit[5355]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3bf17bb0 a2=3 a3=0 items=0 ppid=1 pid=5355 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:33.329669 kernel: audit: type=1300 audit(1746837993.283:1401): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3bf17bb0 a2=3 a3=0 items=0 ppid=1 pid=5355 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:33.283000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:33.338259 kernel: audit: type=1327 audit(1746837993.283:1401): proctitle=737368643A20636F7265205B707269765D May 10 00:46:33.299000 audit[5355]: USER_START pid=5355 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:33.303000 audit[5357]: CRED_ACQ pid=5357 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:33.373223 kernel: audit: type=1105 audit(1746837993.299:1402): pid=5355 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:33.373364 kernel: audit: type=1103 audit(1746837993.303:1403): pid=5357 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:33.783129 sshd[5355]: pam_unix(sshd:session): session closed for user core May 10 00:46:33.784000 audit[5355]: USER_END pid=5355 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:33.786888 systemd-logind[1398]: Session 12 logged out. Waiting for processes to exit. May 10 00:46:33.788378 systemd[1]: sshd@9-10.200.8.40:22-10.200.16.10:42518.service: Deactivated successfully. May 10 00:46:33.789283 systemd[1]: session-12.scope: Deactivated successfully. May 10 00:46:33.790843 systemd-logind[1398]: Removed session 12. May 10 00:46:33.784000 audit[5355]: CRED_DISP pid=5355 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:33.804288 kernel: audit: type=1106 audit(1746837993.784:1404): pid=5355 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:33.804331 kernel: audit: type=1104 audit(1746837993.784:1405): pid=5355 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:33.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.40:22-10.200.16.10:42518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:33.890357 systemd[1]: Started sshd@10-10.200.8.40:22-10.200.16.10:42520.service. May 10 00:46:33.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.40:22-10.200.16.10:42520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:34.532000 audit[5367]: USER_ACCT pid=5367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:34.533304 sshd[5367]: Accepted publickey for core from 10.200.16.10 port 42520 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:46:34.534000 audit[5367]: CRED_ACQ pid=5367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:34.534945 sshd[5367]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:34.534000 audit[5367]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2771b240 a2=3 a3=0 items=0 ppid=1 pid=5367 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:34.534000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:34.539981 systemd[1]: Started session-13.scope. May 10 00:46:34.540474 systemd-logind[1398]: New session 13 of user core. May 10 00:46:34.545000 audit[5367]: USER_START pid=5367 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:34.547000 audit[5369]: CRED_ACQ pid=5369 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:35.074067 sshd[5367]: pam_unix(sshd:session): session closed for user core May 10 00:46:35.075000 audit[5367]: USER_END pid=5367 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:35.075000 audit[5367]: CRED_DISP pid=5367 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:35.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.40:22-10.200.16.10:42520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:35.077478 systemd[1]: sshd@10-10.200.8.40:22-10.200.16.10:42520.service: Deactivated successfully. May 10 00:46:35.079467 systemd[1]: session-13.scope: Deactivated successfully. May 10 00:46:35.079539 systemd-logind[1398]: Session 13 logged out. Waiting for processes to exit. May 10 00:46:35.080858 systemd-logind[1398]: Removed session 13. May 10 00:46:35.180407 systemd[1]: Started sshd@11-10.200.8.40:22-10.200.16.10:42536.service. May 10 00:46:35.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.40:22-10.200.16.10:42536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:35.815000 audit[5377]: USER_ACCT pid=5377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:35.816136 sshd[5377]: Accepted publickey for core from 10.200.16.10 port 42536 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:46:35.816000 audit[5377]: CRED_ACQ pid=5377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:35.816000 audit[5377]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4b67cf90 a2=3 a3=0 items=0 ppid=1 pid=5377 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:35.816000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:35.817734 sshd[5377]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:35.822611 systemd[1]: Started session-14.scope. May 10 00:46:35.823057 systemd-logind[1398]: New session 14 of user core. May 10 00:46:35.827000 audit[5377]: USER_START pid=5377 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:35.829000 audit[5379]: CRED_ACQ pid=5379 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:36.322764 sshd[5377]: pam_unix(sshd:session): session closed for user core May 10 00:46:36.323000 audit[5377]: USER_END pid=5377 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:36.324000 audit[5377]: CRED_DISP pid=5377 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:36.325785 systemd[1]: sshd@11-10.200.8.40:22-10.200.16.10:42536.service: Deactivated successfully. May 10 00:46:36.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.40:22-10.200.16.10:42536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:36.326897 systemd[1]: session-14.scope: Deactivated successfully. May 10 00:46:36.327582 systemd-logind[1398]: Session 14 logged out. Waiting for processes to exit. May 10 00:46:36.328456 systemd-logind[1398]: Removed session 14. May 10 00:46:40.366948 systemd[1]: run-containerd-runc-k8s.io-346af08ddb070fb30d68bc8f1fed645790ba01d00b39c6b5a912b521f14a2723-runc.AdWW8T.mount: Deactivated successfully. May 10 00:46:41.430880 systemd[1]: Started sshd@12-10.200.8.40:22-10.200.16.10:44816.service. May 10 00:46:41.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.40:22-10.200.16.10:44816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:41.436644 kernel: kauditd_printk_skb: 23 callbacks suppressed May 10 00:46:41.436715 kernel: audit: type=1130 audit(1746838001.431:1425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.40:22-10.200.16.10:44816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:42.070000 audit[5407]: USER_ACCT pid=5407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:42.072431 sshd[5407]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:42.089870 sshd[5407]: Accepted publickey for core from 10.200.16.10 port 44816 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:46:42.090266 kernel: audit: type=1101 audit(1746838002.070:1426): pid=5407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:42.071000 audit[5407]: CRED_ACQ pid=5407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:42.095294 systemd-logind[1398]: New session 15 of user core. May 10 00:46:42.096008 systemd[1]: Started session-15.scope. May 10 00:46:42.107301 kernel: audit: type=1103 audit(1746838002.071:1427): pid=5407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:42.107380 kernel: audit: type=1006 audit(1746838002.071:1428): pid=5407 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 10 00:46:42.071000 audit[5407]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc39e5b280 a2=3 a3=0 items=0 ppid=1 pid=5407 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:42.117269 kernel: audit: type=1300 audit(1746838002.071:1428): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc39e5b280 a2=3 a3=0 items=0 ppid=1 pid=5407 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:42.071000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:42.138846 kernel: audit: type=1327 audit(1746838002.071:1428): proctitle=737368643A20636F7265205B707269765D May 10 00:46:42.138907 kernel: audit: type=1105 audit(1746838002.096:1429): pid=5407 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:42.096000 audit[5407]: USER_START pid=5407 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:42.101000 audit[5413]: CRED_ACQ pid=5413 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:42.172317 kernel: audit: type=1103 audit(1746838002.101:1430): pid=5413 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:42.576830 sshd[5407]: pam_unix(sshd:session): session closed for user core May 10 00:46:42.578000 audit[5407]: USER_END pid=5407 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:42.580223 systemd[1]: sshd@12-10.200.8.40:22-10.200.16.10:44816.service: Deactivated successfully. May 10 00:46:42.581008 systemd[1]: session-15.scope: Deactivated successfully. May 10 00:46:42.582401 systemd-logind[1398]: Session 15 logged out. Waiting for processes to exit. May 10 00:46:42.583309 systemd-logind[1398]: Removed session 15. May 10 00:46:42.578000 audit[5407]: CRED_DISP pid=5407 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:42.613922 kernel: audit: type=1106 audit(1746838002.578:1431): pid=5407 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:42.614008 kernel: audit: type=1104 audit(1746838002.578:1432): pid=5407 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:42.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.40:22-10.200.16.10:44816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:47.685951 systemd[1]: Started sshd@13-10.200.8.40:22-10.200.16.10:44826.service. May 10 00:46:47.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.40:22-10.200.16.10:44826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:47.696797 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:46:47.696929 kernel: audit: type=1130 audit(1746838007.685:1434): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.40:22-10.200.16.10:44826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:48.436000 audit[5423]: USER_ACCT pid=5423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:48.436708 sshd[5423]: Accepted publickey for core from 10.200.16.10 port 44826 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:46:48.461276 kernel: audit: type=1101 audit(1746838008.436:1435): pid=5423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:48.461416 kernel: audit: type=1103 audit(1746838008.460:1436): pid=5423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:48.460000 audit[5423]: CRED_ACQ pid=5423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:48.461864 sshd[5423]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:48.471320 systemd[1]: Started session-16.scope. May 10 00:46:48.472353 systemd-logind[1398]: New session 16 of user core. May 10 00:46:48.493164 kernel: audit: type=1006 audit(1746838008.460:1437): pid=5423 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 10 00:46:48.493377 kernel: audit: type=1300 audit(1746838008.460:1437): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6f8621d0 a2=3 a3=0 items=0 ppid=1 pid=5423 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:48.460000 audit[5423]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6f8621d0 a2=3 a3=0 items=0 ppid=1 pid=5423 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:48.513288 kernel: audit: type=1327 audit(1746838008.460:1437): proctitle=737368643A20636F7265205B707269765D May 10 00:46:48.460000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:48.478000 audit[5423]: USER_START pid=5423 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:48.516324 kernel: audit: type=1105 audit(1746838008.478:1438): pid=5423 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:48.480000 audit[5425]: CRED_ACQ pid=5425 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:48.533275 kernel: audit: type=1103 audit(1746838008.480:1439): pid=5425 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:48.942599 sshd[5423]: pam_unix(sshd:session): session closed for user core May 10 00:46:48.943000 audit[5423]: USER_END pid=5423 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:48.950233 systemd[1]: sshd@13-10.200.8.40:22-10.200.16.10:44826.service: Deactivated successfully. May 10 00:46:48.951048 systemd[1]: session-16.scope: Deactivated successfully. May 10 00:46:48.953481 systemd-logind[1398]: Session 16 logged out. Waiting for processes to exit. May 10 00:46:48.954417 systemd-logind[1398]: Removed session 16. May 10 00:46:48.943000 audit[5423]: CRED_DISP pid=5423 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:48.975805 kernel: audit: type=1106 audit(1746838008.943:1440): pid=5423 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:48.975890 kernel: audit: type=1104 audit(1746838008.943:1441): pid=5423 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:48.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.40:22-10.200.16.10:44826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:54.050420 systemd[1]: Started sshd@14-10.200.8.40:22-10.200.16.10:60462.service. May 10 00:46:54.076826 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:46:54.076917 kernel: audit: type=1130 audit(1746838014.049:1443): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.40:22-10.200.16.10:60462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:54.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.40:22-10.200.16.10:60462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:54.689000 audit[5437]: USER_ACCT pid=5437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:54.692103 sshd[5437]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:54.711442 kernel: audit: type=1101 audit(1746838014.689:1444): pid=5437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:54.711473 sshd[5437]: Accepted publickey for core from 10.200.16.10 port 60462 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:46:54.690000 audit[5437]: CRED_ACQ pid=5437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:54.717656 systemd[1]: Started session-17.scope. May 10 00:46:54.718631 systemd-logind[1398]: New session 17 of user core. May 10 00:46:54.732333 kernel: audit: type=1103 audit(1746838014.690:1445): pid=5437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:54.749283 kernel: audit: type=1006 audit(1746838014.690:1446): pid=5437 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 10 00:46:54.690000 audit[5437]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3df2d820 a2=3 a3=0 items=0 ppid=1 pid=5437 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:54.769291 kernel: audit: type=1300 audit(1746838014.690:1446): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3df2d820 a2=3 a3=0 items=0 ppid=1 pid=5437 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:54.690000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:54.724000 audit[5437]: USER_START pid=5437 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:54.799506 kernel: audit: type=1327 audit(1746838014.690:1446): proctitle=737368643A20636F7265205B707269765D May 10 00:46:54.799670 kernel: audit: type=1105 audit(1746838014.724:1447): pid=5437 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:54.727000 audit[5439]: CRED_ACQ pid=5439 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:54.816292 kernel: audit: type=1103 audit(1746838014.727:1448): pid=5439 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:55.258753 sshd[5437]: pam_unix(sshd:session): session closed for user core May 10 00:46:55.259000 audit[5437]: USER_END pid=5437 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:55.262541 systemd[1]: sshd@14-10.200.8.40:22-10.200.16.10:60462.service: Deactivated successfully. May 10 00:46:55.269298 systemd-logind[1398]: Session 17 logged out. Waiting for processes to exit. May 10 00:46:55.281310 kernel: audit: type=1106 audit(1746838015.259:1449): pid=5437 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:55.280715 systemd[1]: session-17.scope: Deactivated successfully. May 10 00:46:55.282313 systemd-logind[1398]: Removed session 17. May 10 00:46:55.259000 audit[5437]: CRED_DISP pid=5437 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:55.303389 kernel: audit: type=1104 audit(1746838015.259:1450): pid=5437 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:55.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.40:22-10.200.16.10:60462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:55.365377 systemd[1]: Started sshd@15-10.200.8.40:22-10.200.16.10:60464.service. May 10 00:46:55.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.40:22-10.200.16.10:60464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:56.000000 audit[5449]: USER_ACCT pid=5449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:56.002445 sshd[5449]: Accepted publickey for core from 10.200.16.10 port 60464 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:46:56.002000 audit[5449]: CRED_ACQ pid=5449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:56.002000 audit[5449]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff46e092b0 a2=3 a3=0 items=0 ppid=1 pid=5449 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:56.002000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:56.004009 sshd[5449]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:56.008802 systemd-logind[1398]: New session 18 of user core. May 10 00:46:56.009335 systemd[1]: Started session-18.scope. May 10 00:46:56.014000 audit[5449]: USER_START pid=5449 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:56.015000 audit[5451]: CRED_ACQ pid=5451 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:56.600975 sshd[5449]: pam_unix(sshd:session): session closed for user core May 10 00:46:56.601000 audit[5449]: USER_END pid=5449 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:56.601000 audit[5449]: CRED_DISP pid=5449 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:56.604746 systemd[1]: sshd@15-10.200.8.40:22-10.200.16.10:60464.service: Deactivated successfully. May 10 00:46:56.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.40:22-10.200.16.10:60464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:56.605933 systemd[1]: session-18.scope: Deactivated successfully. May 10 00:46:56.606911 systemd-logind[1398]: Session 18 logged out. Waiting for processes to exit. May 10 00:46:56.607942 systemd-logind[1398]: Removed session 18. May 10 00:46:56.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.40:22-10.200.16.10:60476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:56.708005 systemd[1]: Started sshd@16-10.200.8.40:22-10.200.16.10:60476.service. May 10 00:46:56.790536 systemd[1]: run-containerd-runc-k8s.io-82ce7916b01a4e43bb5b528f1228da214814a19205c14597435f0ea4161db6d7-runc.9vT8wL.mount: Deactivated successfully. May 10 00:46:57.345000 audit[5459]: USER_ACCT pid=5459 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:57.347459 sshd[5459]: Accepted publickey for core from 10.200.16.10 port 60476 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:46:57.347000 audit[5459]: CRED_ACQ pid=5459 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:57.347000 audit[5459]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc12a0f600 a2=3 a3=0 items=0 ppid=1 pid=5459 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:57.347000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:57.348961 sshd[5459]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:57.355167 systemd[1]: Started session-19.scope. May 10 00:46:57.355659 systemd-logind[1398]: New session 19 of user core. May 10 00:46:57.360000 audit[5459]: USER_START pid=5459 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:57.362000 audit[5482]: CRED_ACQ pid=5482 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:59.487000 audit[5492]: NETFILTER_CFG table=filter:128 family=2 entries=20 op=nft_register_rule pid=5492 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:59.495304 kernel: kauditd_printk_skb: 20 callbacks suppressed May 10 00:46:59.495451 kernel: audit: type=1325 audit(1746838019.487:1467): table=filter:128 family=2 entries=20 op=nft_register_rule pid=5492 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:59.487000 audit[5492]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffd1687fc0 a2=0 a3=7fffd1687fac items=0 ppid=2685 pid=5492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:59.532421 kernel: audit: type=1300 audit(1746838019.487:1467): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffd1687fc0 a2=0 a3=7fffd1687fac items=0 ppid=2685 pid=5492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:59.487000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:59.544488 kernel: audit: type=1327 audit(1746838019.487:1467): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:59.548000 audit[5492]: NETFILTER_CFG table=nat:129 family=2 entries=22 op=nft_register_rule pid=5492 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:59.560260 kernel: audit: type=1325 audit(1746838019.548:1468): table=nat:129 family=2 entries=22 op=nft_register_rule pid=5492 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:59.548000 audit[5492]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffd1687fc0 a2=0 a3=0 items=0 ppid=2685 pid=5492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:59.548000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:59.591759 kernel: audit: type=1300 audit(1746838019.548:1468): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffd1687fc0 a2=0 a3=0 items=0 ppid=2685 pid=5492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:59.591897 kernel: audit: type=1327 audit(1746838019.548:1468): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:59.593000 audit[5494]: NETFILTER_CFG table=filter:130 family=2 entries=32 op=nft_register_rule pid=5494 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:59.593000 audit[5494]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdf21cfa70 a2=0 a3=7ffdf21cfa5c items=0 ppid=2685 pid=5494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:59.624324 kernel: audit: type=1325 audit(1746838019.593:1469): table=filter:130 family=2 entries=32 op=nft_register_rule pid=5494 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:59.624466 kernel: audit: type=1300 audit(1746838019.593:1469): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdf21cfa70 a2=0 a3=7ffdf21cfa5c items=0 ppid=2685 pid=5494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:59.593000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:59.634540 kernel: audit: type=1327 audit(1746838019.593:1469): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:59.623000 audit[5494]: NETFILTER_CFG table=nat:131 family=2 entries=22 op=nft_register_rule pid=5494 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:59.644498 kernel: audit: type=1325 audit(1746838019.623:1470): table=nat:131 family=2 entries=22 op=nft_register_rule pid=5494 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:59.623000 audit[5494]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdf21cfa70 a2=0 a3=0 items=0 ppid=2685 pid=5494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:59.623000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:59.657527 sshd[5459]: pam_unix(sshd:session): session closed for user core May 10 00:46:59.657000 audit[5459]: USER_END pid=5459 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:59.657000 audit[5459]: CRED_DISP pid=5459 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:59.660800 systemd-logind[1398]: Session 19 logged out. Waiting for processes to exit. May 10 00:46:59.660995 systemd[1]: sshd@16-10.200.8.40:22-10.200.16.10:60476.service: Deactivated successfully. May 10 00:46:59.661964 systemd[1]: session-19.scope: Deactivated successfully. May 10 00:46:59.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.40:22-10.200.16.10:60476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:59.662979 systemd-logind[1398]: Removed session 19. May 10 00:46:59.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.40:22-10.200.16.10:36706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:59.762633 systemd[1]: Started sshd@17-10.200.8.40:22-10.200.16.10:36706.service. May 10 00:47:00.404000 audit[5497]: USER_ACCT pid=5497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:00.405834 sshd[5497]: Accepted publickey for core from 10.200.16.10 port 36706 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:47:00.405000 audit[5497]: CRED_ACQ pid=5497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:00.405000 audit[5497]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2f6ba1c0 a2=3 a3=0 items=0 ppid=1 pid=5497 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:00.405000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:00.407534 sshd[5497]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:00.412345 systemd-logind[1398]: New session 20 of user core. May 10 00:47:00.412797 systemd[1]: Started session-20.scope. May 10 00:47:00.416000 audit[5497]: USER_START pid=5497 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:00.417000 audit[5499]: CRED_ACQ pid=5499 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:00.694000 audit[4665]: AVC avc: denied { watch } for pid=4665 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_44_40.169962964/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c436,c851 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c436,c851 tclass=file permissive=0 May 10 00:47:00.694000 audit[4665]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000aa0240 a2=fc6 a3=0 items=0 ppid=4193 pid=4665 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c436,c851 key=(null) May 10 00:47:00.694000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:47:01.013957 sshd[5497]: pam_unix(sshd:session): session closed for user core May 10 00:47:01.014000 audit[5497]: USER_END pid=5497 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:01.014000 audit[5497]: CRED_DISP pid=5497 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:01.017467 systemd[1]: sshd@17-10.200.8.40:22-10.200.16.10:36706.service: Deactivated successfully. May 10 00:47:01.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.40:22-10.200.16.10:36706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:01.018762 systemd[1]: session-20.scope: Deactivated successfully. May 10 00:47:01.018789 systemd-logind[1398]: Session 20 logged out. Waiting for processes to exit. May 10 00:47:01.019974 systemd-logind[1398]: Removed session 20. May 10 00:47:01.121232 systemd[1]: Started sshd@18-10.200.8.40:22-10.200.16.10:36714.service. May 10 00:47:01.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.40:22-10.200.16.10:36714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:01.754000 audit[5506]: USER_ACCT pid=5506 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:01.756438 sshd[5506]: Accepted publickey for core from 10.200.16.10 port 36714 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:47:01.756000 audit[5506]: CRED_ACQ pid=5506 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:01.756000 audit[5506]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc18629c30 a2=3 a3=0 items=0 ppid=1 pid=5506 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:01.756000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:01.757912 sshd[5506]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:01.762878 systemd[1]: Started session-21.scope. May 10 00:47:01.763078 systemd-logind[1398]: New session 21 of user core. May 10 00:47:01.766000 audit[5506]: USER_START pid=5506 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:01.768000 audit[5508]: CRED_ACQ pid=5508 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:02.265160 sshd[5506]: pam_unix(sshd:session): session closed for user core May 10 00:47:02.265000 audit[5506]: USER_END pid=5506 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:02.265000 audit[5506]: CRED_DISP pid=5506 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:02.268344 systemd[1]: sshd@18-10.200.8.40:22-10.200.16.10:36714.service: Deactivated successfully. May 10 00:47:02.269370 systemd[1]: session-21.scope: Deactivated successfully. May 10 00:47:02.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.40:22-10.200.16.10:36714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:02.270284 systemd-logind[1398]: Session 21 logged out. Waiting for processes to exit. May 10 00:47:02.271173 systemd-logind[1398]: Removed session 21. May 10 00:47:02.304000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:02.304000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0127e9e40 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:47:02.304000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:47:02.321000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8313 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:02.321000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:02.321000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c016339b60 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:47:02.321000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:47:02.321000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c0162e9b00 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:47:02.321000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:47:02.324000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8315 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:02.324000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c016339bf0 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:47:02.324000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:47:02.330000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8313 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:02.330000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00150b470 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:47:02.330000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:02.330000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:02.330000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0027e61c0 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:47:02.330000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:02.367000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8313 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:02.367000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c016339c20 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:47:02.367000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:47:02.380000 audit[2357]: AVC avc: denied { watch } for pid=2357 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:02.380000 audit[2357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c01642a120 a2=fc6 a3=0 items=0 ppid=2214 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c682 key=(null) May 10 00:47:02.380000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:47:03.005000 audit[4744]: AVC avc: denied { watch } for pid=4744 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_44_40.4043679354/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c286,c437 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c286,c437 tclass=file permissive=0 May 10 00:47:03.005000 audit[4744]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002571060 a2=fc6 a3=0 items=0 ppid=4451 pid=4744 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c286,c437 key=(null) May 10 00:47:03.005000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:47:07.107000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:07.113595 kernel: kauditd_printk_skb: 57 callbacks suppressed May 10 00:47:07.113708 kernel: audit: type=1400 audit(1746838027.107:1502): avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:07.107000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00225f0a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:47:07.129268 kernel: audit: type=1300 audit(1746838027.107:1502): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00225f0a0 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:47:07.107000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:07.149278 kernel: audit: type=1327 audit(1746838027.107:1502): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:07.165751 kernel: audit: type=1400 audit(1746838027.112:1503): avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:07.112000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:07.112000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00225f240 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:47:07.182265 kernel: audit: type=1300 audit(1746838027.112:1503): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00225f240 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:47:07.112000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:07.218446 kernel: audit: type=1327 audit(1746838027.112:1503): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:07.218577 kernel: audit: type=1400 audit(1746838027.112:1504): avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:07.112000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:07.112000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0027e6900 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:47:07.253559 kernel: audit: type=1300 audit(1746838027.112:1504): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0027e6900 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:47:07.253691 kernel: audit: type=1327 audit(1746838027.112:1504): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:07.112000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:07.115000 audit[2387]: AVC avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:07.286996 kernel: audit: type=1400 audit(1746838027.115:1505): avc: denied { watch } for pid=2387 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:07.115000 audit[2387]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00225f260 a2=fc6 a3=0 items=0 ppid=2244 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c137 key=(null) May 10 00:47:07.115000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:07.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.40:22-10.200.16.10:36728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:07.373004 systemd[1]: Started sshd@19-10.200.8.40:22-10.200.16.10:36728.service. May 10 00:47:08.010000 audit[5520]: USER_ACCT pid=5520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:08.012461 sshd[5520]: Accepted publickey for core from 10.200.16.10 port 36728 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:47:08.012000 audit[5520]: CRED_ACQ pid=5520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:08.014055 sshd[5520]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:08.012000 audit[5520]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfda3e670 a2=3 a3=0 items=0 ppid=1 pid=5520 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:08.012000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:08.019215 systemd-logind[1398]: New session 22 of user core. May 10 00:47:08.019746 systemd[1]: Started session-22.scope. May 10 00:47:08.023000 audit[5520]: USER_START pid=5520 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:08.025000 audit[5522]: CRED_ACQ pid=5522 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:08.520120 sshd[5520]: pam_unix(sshd:session): session closed for user core May 10 00:47:08.520000 audit[5520]: USER_END pid=5520 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:08.520000 audit[5520]: CRED_DISP pid=5520 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:08.523768 systemd[1]: sshd@19-10.200.8.40:22-10.200.16.10:36728.service: Deactivated successfully. May 10 00:47:08.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.40:22-10.200.16.10:36728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:08.524964 systemd[1]: session-22.scope: Deactivated successfully. May 10 00:47:08.525913 systemd-logind[1398]: Session 22 logged out. Waiting for processes to exit. May 10 00:47:08.526946 systemd-logind[1398]: Removed session 22. May 10 00:47:10.791000 audit[5551]: NETFILTER_CFG table=filter:132 family=2 entries=20 op=nft_register_rule pid=5551 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:10.791000 audit[5551]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffba7e3100 a2=0 a3=7fffba7e30ec items=0 ppid=2685 pid=5551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:10.791000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:10.797000 audit[5551]: NETFILTER_CFG table=nat:133 family=2 entries=106 op=nft_register_chain pid=5551 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:10.797000 audit[5551]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffba7e3100 a2=0 a3=7fffba7e30ec items=0 ppid=2685 pid=5551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:10.797000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:13.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.40:22-10.200.16.10:44984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:13.629203 systemd[1]: Started sshd@20-10.200.8.40:22-10.200.16.10:44984.service. May 10 00:47:13.640634 kernel: kauditd_printk_skb: 19 callbacks suppressed May 10 00:47:13.640733 kernel: audit: type=1130 audit(1746838033.628:1517): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.40:22-10.200.16.10:44984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:14.270000 audit[5554]: USER_ACCT pid=5554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:14.273465 sshd[5554]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:14.290909 sshd[5554]: Accepted publickey for core from 10.200.16.10 port 44984 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:47:14.271000 audit[5554]: CRED_ACQ pid=5554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:14.295206 systemd[1]: Started session-23.scope. May 10 00:47:14.296367 systemd-logind[1398]: New session 23 of user core. May 10 00:47:14.308671 kernel: audit: type=1101 audit(1746838034.270:1518): pid=5554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:14.308782 kernel: audit: type=1103 audit(1746838034.271:1519): pid=5554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:14.308808 kernel: audit: type=1006 audit(1746838034.271:1520): pid=5554 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 10 00:47:14.271000 audit[5554]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc949b45f0 a2=3 a3=0 items=0 ppid=1 pid=5554 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:14.337172 kernel: audit: type=1300 audit(1746838034.271:1520): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc949b45f0 a2=3 a3=0 items=0 ppid=1 pid=5554 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:14.271000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:14.307000 audit[5554]: USER_START pid=5554 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:14.363359 kernel: audit: type=1327 audit(1746838034.271:1520): proctitle=737368643A20636F7265205B707269765D May 10 00:47:14.363464 kernel: audit: type=1105 audit(1746838034.307:1521): pid=5554 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:14.312000 audit[5556]: CRED_ACQ pid=5556 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:14.378265 kernel: audit: type=1103 audit(1746838034.312:1522): pid=5556 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:14.781029 sshd[5554]: pam_unix(sshd:session): session closed for user core May 10 00:47:14.781000 audit[5554]: USER_END pid=5554 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:14.784442 systemd-logind[1398]: Session 23 logged out. Waiting for processes to exit. May 10 00:47:14.785681 systemd[1]: sshd@20-10.200.8.40:22-10.200.16.10:44984.service: Deactivated successfully. May 10 00:47:14.786467 systemd[1]: session-23.scope: Deactivated successfully. May 10 00:47:14.787666 systemd-logind[1398]: Removed session 23. May 10 00:47:14.781000 audit[5554]: CRED_DISP pid=5554 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:14.816530 kernel: audit: type=1106 audit(1746838034.781:1523): pid=5554 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:14.816668 kernel: audit: type=1104 audit(1746838034.781:1524): pid=5554 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:14.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.40:22-10.200.16.10:44984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:19.888489 systemd[1]: Started sshd@21-10.200.8.40:22-10.200.16.10:51890.service. May 10 00:47:19.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.40:22-10.200.16.10:51890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:19.894759 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:47:19.894836 kernel: audit: type=1130 audit(1746838039.887:1526): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.40:22-10.200.16.10:51890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:20.435058 systemd[1]: run-containerd-runc-k8s.io-346af08ddb070fb30d68bc8f1fed645790ba01d00b39c6b5a912b521f14a2723-runc.HFKUWU.mount: Deactivated successfully. May 10 00:47:20.529000 audit[5568]: USER_ACCT pid=5568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:20.530874 sshd[5568]: Accepted publickey for core from 10.200.16.10 port 51890 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:47:20.549000 audit[5568]: CRED_ACQ pid=5568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:20.551186 sshd[5568]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:20.556324 systemd[1]: Started session-24.scope. May 10 00:47:20.557366 systemd-logind[1398]: New session 24 of user core. May 10 00:47:20.567776 kernel: audit: type=1101 audit(1746838040.529:1527): pid=5568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:20.567862 kernel: audit: type=1103 audit(1746838040.549:1528): pid=5568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:20.567892 kernel: audit: type=1006 audit(1746838040.549:1529): pid=5568 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 10 00:47:20.549000 audit[5568]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd33b58880 a2=3 a3=0 items=0 ppid=1 pid=5568 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:20.578302 kernel: audit: type=1300 audit(1746838040.549:1529): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd33b58880 a2=3 a3=0 items=0 ppid=1 pid=5568 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:20.594440 kernel: audit: type=1327 audit(1746838040.549:1529): proctitle=737368643A20636F7265205B707269765D May 10 00:47:20.549000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:20.561000 audit[5568]: USER_START pid=5568 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:20.618199 kernel: audit: type=1105 audit(1746838040.561:1530): pid=5568 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:20.618294 kernel: audit: type=1103 audit(1746838040.563:1531): pid=5590 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:20.563000 audit[5590]: CRED_ACQ pid=5590 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:21.037850 sshd[5568]: pam_unix(sshd:session): session closed for user core May 10 00:47:21.038000 audit[5568]: USER_END pid=5568 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:21.041717 systemd[1]: sshd@21-10.200.8.40:22-10.200.16.10:51890.service: Deactivated successfully. May 10 00:47:21.042527 systemd[1]: session-24.scope: Deactivated successfully. May 10 00:47:21.043809 systemd-logind[1398]: Session 24 logged out. Waiting for processes to exit. May 10 00:47:21.044721 systemd-logind[1398]: Removed session 24. May 10 00:47:21.038000 audit[5568]: CRED_DISP pid=5568 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:21.072644 kernel: audit: type=1106 audit(1746838041.038:1532): pid=5568 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:21.072743 kernel: audit: type=1104 audit(1746838041.038:1533): pid=5568 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:21.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.40:22-10.200.16.10:51890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:26.146194 systemd[1]: Started sshd@22-10.200.8.40:22-10.200.16.10:51906.service. May 10 00:47:26.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.40:22-10.200.16.10:51906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:26.152365 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:47:26.152429 kernel: audit: type=1130 audit(1746838046.146:1535): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.40:22-10.200.16.10:51906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:26.810345 kernel: audit: type=1101 audit(1746838046.789:1536): pid=5600 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:26.789000 audit[5600]: USER_ACCT pid=5600 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:26.810209 sshd[5600]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:26.810896 sshd[5600]: Accepted publickey for core from 10.200.16.10 port 51906 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:47:26.808000 audit[5600]: CRED_ACQ pid=5600 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:26.819084 systemd[1]: run-containerd-runc-k8s.io-82ce7916b01a4e43bb5b528f1228da214814a19205c14597435f0ea4161db6d7-runc.5EyUzI.mount: Deactivated successfully. May 10 00:47:26.835184 kernel: audit: type=1103 audit(1746838046.808:1537): pid=5600 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:26.835348 kernel: audit: type=1006 audit(1746838046.808:1538): pid=5600 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 10 00:47:26.834830 systemd[1]: Started session-25.scope. May 10 00:47:26.835641 systemd-logind[1398]: New session 25 of user core. May 10 00:47:26.808000 audit[5600]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd97b1960 a2=3 a3=0 items=0 ppid=1 pid=5600 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:26.981276 kernel: audit: type=1300 audit(1746838046.808:1538): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd97b1960 a2=3 a3=0 items=0 ppid=1 pid=5600 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:26.808000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:26.840000 audit[5600]: USER_START pid=5600 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:26.988273 kernel: audit: type=1327 audit(1746838046.808:1538): proctitle=737368643A20636F7265205B707269765D May 10 00:47:26.988339 kernel: audit: type=1105 audit(1746838046.840:1539): pid=5600 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:26.846000 audit[5611]: CRED_ACQ pid=5611 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:27.005268 kernel: audit: type=1103 audit(1746838046.846:1540): pid=5611 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:27.301148 sshd[5600]: pam_unix(sshd:session): session closed for user core May 10 00:47:27.301000 audit[5600]: USER_END pid=5600 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:27.305108 systemd[1]: sshd@22-10.200.8.40:22-10.200.16.10:51906.service: Deactivated successfully. May 10 00:47:27.306043 systemd[1]: session-25.scope: Deactivated successfully. May 10 00:47:27.307932 systemd-logind[1398]: Session 25 logged out. Waiting for processes to exit. May 10 00:47:27.309140 systemd-logind[1398]: Removed session 25. May 10 00:47:27.328883 kernel: audit: type=1106 audit(1746838047.301:1541): pid=5600 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:27.329045 kernel: audit: type=1104 audit(1746838047.301:1542): pid=5600 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:27.301000 audit[5600]: CRED_DISP pid=5600 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:27.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.40:22-10.200.16.10:51906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:32.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.40:22-10.200.16.10:47320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:32.409659 systemd[1]: Started sshd@23-10.200.8.40:22-10.200.16.10:47320.service. May 10 00:47:32.415204 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:47:32.415419 kernel: audit: type=1130 audit(1746838052.408:1544): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.40:22-10.200.16.10:47320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:33.048000 audit[5640]: USER_ACCT pid=5640 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:33.072327 kernel: audit: type=1101 audit(1746838053.048:1545): pid=5640 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:33.072391 sshd[5640]: Accepted publickey for core from 10.200.16.10 port 47320 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:47:33.072927 sshd[5640]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:33.071000 audit[5640]: CRED_ACQ pid=5640 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:33.078580 systemd[1]: Started session-26.scope. May 10 00:47:33.079608 systemd-logind[1398]: New session 26 of user core. May 10 00:47:33.093271 kernel: audit: type=1103 audit(1746838053.071:1546): pid=5640 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:33.103284 kernel: audit: type=1006 audit(1746838053.071:1547): pid=5640 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 10 00:47:33.103377 kernel: audit: type=1300 audit(1746838053.071:1547): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffce57b3d0 a2=3 a3=0 items=0 ppid=1 pid=5640 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:33.071000 audit[5640]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffce57b3d0 a2=3 a3=0 items=0 ppid=1 pid=5640 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:33.071000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:33.125892 kernel: audit: type=1327 audit(1746838053.071:1547): proctitle=737368643A20636F7265205B707269765D May 10 00:47:33.091000 audit[5640]: USER_START pid=5640 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:33.126295 kernel: audit: type=1105 audit(1746838053.091:1548): pid=5640 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:33.143755 kernel: audit: type=1103 audit(1746838053.092:1549): pid=5643 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:33.092000 audit[5643]: CRED_ACQ pid=5643 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:33.558123 sshd[5640]: pam_unix(sshd:session): session closed for user core May 10 00:47:33.558000 audit[5640]: USER_END pid=5640 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:33.562055 systemd[1]: sshd@23-10.200.8.40:22-10.200.16.10:47320.service: Deactivated successfully. May 10 00:47:33.562966 systemd[1]: session-26.scope: Deactivated successfully. May 10 00:47:33.565031 systemd-logind[1398]: Session 26 logged out. Waiting for processes to exit. May 10 00:47:33.566038 systemd-logind[1398]: Removed session 26. May 10 00:47:33.558000 audit[5640]: CRED_DISP pid=5640 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:33.594388 kernel: audit: type=1106 audit(1746838053.558:1550): pid=5640 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:33.594490 kernel: audit: type=1104 audit(1746838053.558:1551): pid=5640 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:33.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.40:22-10.200.16.10:47320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:38.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.40:22-10.200.16.10:47330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:38.694144 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:47:38.694219 kernel: audit: type=1130 audit(1746838058.665:1553): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.40:22-10.200.16.10:47330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:38.665974 systemd[1]: Started sshd@24-10.200.8.40:22-10.200.16.10:47330.service. May 10 00:47:39.302000 audit[5656]: USER_ACCT pid=5656 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:39.326486 kernel: audit: type=1101 audit(1746838059.302:1554): pid=5656 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:39.305741 sshd[5656]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:39.326927 sshd[5656]: Accepted publickey for core from 10.200.16.10 port 47330 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:47:39.304000 audit[5656]: CRED_ACQ pid=5656 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:39.332299 systemd[1]: Started session-27.scope. May 10 00:47:39.333219 systemd-logind[1398]: New session 27 of user core. May 10 00:47:39.355981 kernel: audit: type=1103 audit(1746838059.304:1555): pid=5656 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:39.356092 kernel: audit: type=1006 audit(1746838059.304:1556): pid=5656 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 10 00:47:39.356128 kernel: audit: type=1300 audit(1746838059.304:1556): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc8f92ad0 a2=3 a3=0 items=0 ppid=1 pid=5656 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:39.304000 audit[5656]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc8f92ad0 a2=3 a3=0 items=0 ppid=1 pid=5656 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:39.304000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:39.336000 audit[5656]: USER_START pid=5656 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:39.399679 kernel: audit: type=1327 audit(1746838059.304:1556): proctitle=737368643A20636F7265205B707269765D May 10 00:47:39.399804 kernel: audit: type=1105 audit(1746838059.336:1557): pid=5656 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:39.399862 kernel: audit: type=1103 audit(1746838059.339:1558): pid=5659 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:39.339000 audit[5659]: CRED_ACQ pid=5659 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:39.823401 sshd[5656]: pam_unix(sshd:session): session closed for user core May 10 00:47:39.824000 audit[5656]: USER_END pid=5656 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:39.828720 systemd[1]: sshd@24-10.200.8.40:22-10.200.16.10:47330.service: Deactivated successfully. May 10 00:47:39.829687 systemd[1]: session-27.scope: Deactivated successfully. May 10 00:47:39.831789 systemd-logind[1398]: Session 27 logged out. Waiting for processes to exit. May 10 00:47:39.832816 systemd-logind[1398]: Removed session 27. May 10 00:47:39.824000 audit[5656]: CRED_DISP pid=5656 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:39.867227 kernel: audit: type=1106 audit(1746838059.824:1559): pid=5656 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:39.867395 kernel: audit: type=1104 audit(1746838059.824:1560): pid=5656 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:47:39.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.40:22-10.200.16.10:47330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:40.376639 systemd[1]: run-containerd-runc-k8s.io-346af08ddb070fb30d68bc8f1fed645790ba01d00b39c6b5a912b521f14a2723-runc.LKCian.mount: Deactivated successfully.