May 10 01:15:15.919539 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 01:15:15.919582 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 01:15:15.919601 kernel: BIOS-provided physical RAM map: May 10 01:15:15.919612 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 10 01:15:15.919621 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 10 01:15:15.919631 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 10 01:15:15.919642 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable May 10 01:15:15.919652 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved May 10 01:15:15.919662 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 10 01:15:15.919672 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved May 10 01:15:15.919686 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 10 01:15:15.919696 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 10 01:15:15.919706 kernel: NX (Execute Disable) protection: active May 10 01:15:15.919716 kernel: SMBIOS 2.8 present. May 10 01:15:15.919728 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 May 10 01:15:15.919739 kernel: Hypervisor detected: KVM May 10 01:15:15.919754 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 10 01:15:15.919765 kernel: kvm-clock: cpu 0, msr 29196001, primary cpu clock May 10 01:15:15.919776 kernel: kvm-clock: using sched offset of 4960816924 cycles May 10 01:15:15.919787 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 10 01:15:15.919798 kernel: tsc: Detected 2499.998 MHz processor May 10 01:15:15.919809 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 01:15:15.919820 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 01:15:15.919830 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 May 10 01:15:15.919841 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 01:15:15.924906 kernel: Using GB pages for direct mapping May 10 01:15:15.924932 kernel: ACPI: Early table checksum verification disabled May 10 01:15:15.924944 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) May 10 01:15:15.924956 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 01:15:15.924967 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 10 01:15:15.924978 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 01:15:15.924989 kernel: ACPI: FACS 0x000000007FFDFD40 000040 May 10 01:15:15.925000 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 01:15:15.925011 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 01:15:15.925029 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 01:15:15.925040 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 01:15:15.925051 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] May 10 01:15:15.925062 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] May 10 01:15:15.925073 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] May 10 01:15:15.925084 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] May 10 01:15:15.925100 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] May 10 01:15:15.925116 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] May 10 01:15:15.925127 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] May 10 01:15:15.925139 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 10 01:15:15.925150 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 10 01:15:15.925162 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 May 10 01:15:15.925173 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 May 10 01:15:15.925185 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 May 10 01:15:15.925200 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 May 10 01:15:15.925212 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 May 10 01:15:15.925223 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 May 10 01:15:15.925234 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 May 10 01:15:15.925246 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 May 10 01:15:15.925257 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 May 10 01:15:15.925268 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 May 10 01:15:15.925280 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 May 10 01:15:15.925291 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 May 10 01:15:15.925303 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 May 10 01:15:15.925318 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 May 10 01:15:15.925330 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 10 01:15:15.925341 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] May 10 01:15:15.925353 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug May 10 01:15:15.925364 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] May 10 01:15:15.925376 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] May 10 01:15:15.925388 kernel: Zone ranges: May 10 01:15:15.925399 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 01:15:15.925411 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] May 10 01:15:15.925427 kernel: Normal empty May 10 01:15:15.925438 kernel: Movable zone start for each node May 10 01:15:15.925450 kernel: Early memory node ranges May 10 01:15:15.925461 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 10 01:15:15.925473 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] May 10 01:15:15.925484 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] May 10 01:15:15.925496 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 01:15:15.925507 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 10 01:15:15.925519 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges May 10 01:15:15.925534 kernel: ACPI: PM-Timer IO Port: 0x608 May 10 01:15:15.925545 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 10 01:15:15.925557 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 10 01:15:15.925568 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 10 01:15:15.925580 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 10 01:15:15.925591 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 10 01:15:15.925603 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 10 01:15:15.925614 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 10 01:15:15.925625 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 01:15:15.925641 kernel: TSC deadline timer available May 10 01:15:15.925652 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs May 10 01:15:15.925664 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices May 10 01:15:15.925675 kernel: Booting paravirtualized kernel on KVM May 10 01:15:15.925687 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 01:15:15.925699 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 May 10 01:15:15.925710 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 May 10 01:15:15.925722 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 May 10 01:15:15.925733 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 May 10 01:15:15.925749 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 May 10 01:15:15.925760 kernel: kvm-guest: PV spinlocks enabled May 10 01:15:15.925772 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 10 01:15:15.925783 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 May 10 01:15:15.925795 kernel: Policy zone: DMA32 May 10 01:15:15.925808 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 01:15:15.925820 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 01:15:15.925832 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 10 01:15:15.925848 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 10 01:15:15.925909 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 01:15:15.925924 kernel: Memory: 1903832K/2096616K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 192524K reserved, 0K cma-reserved) May 10 01:15:15.925936 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 May 10 01:15:15.925948 kernel: Kernel/User page tables isolation: enabled May 10 01:15:15.925960 kernel: ftrace: allocating 34584 entries in 136 pages May 10 01:15:15.925971 kernel: ftrace: allocated 136 pages with 2 groups May 10 01:15:15.925983 kernel: rcu: Hierarchical RCU implementation. May 10 01:15:15.925995 kernel: rcu: RCU event tracing is enabled. May 10 01:15:15.926012 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. May 10 01:15:15.926024 kernel: Rude variant of Tasks RCU enabled. May 10 01:15:15.926036 kernel: Tracing variant of Tasks RCU enabled. May 10 01:15:15.926048 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 01:15:15.926059 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 May 10 01:15:15.926071 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 May 10 01:15:15.926083 kernel: random: crng init done May 10 01:15:15.926107 kernel: Console: colour VGA+ 80x25 May 10 01:15:15.926120 kernel: printk: console [tty0] enabled May 10 01:15:15.926132 kernel: printk: console [ttyS0] enabled May 10 01:15:15.926144 kernel: ACPI: Core revision 20210730 May 10 01:15:15.926156 kernel: APIC: Switch to symmetric I/O mode setup May 10 01:15:15.926171 kernel: x2apic enabled May 10 01:15:15.926184 kernel: Switched APIC routing to physical x2apic. May 10 01:15:15.926196 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns May 10 01:15:15.926208 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) May 10 01:15:15.926220 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 10 01:15:15.926237 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 May 10 01:15:15.926249 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 May 10 01:15:15.926261 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 01:15:15.926272 kernel: Spectre V2 : Mitigation: Retpolines May 10 01:15:15.926284 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 10 01:15:15.926296 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls May 10 01:15:15.926308 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 10 01:15:15.926320 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 10 01:15:15.926332 kernel: MDS: Mitigation: Clear CPU buffers May 10 01:15:15.926344 kernel: MMIO Stale Data: Unknown: No mitigations May 10 01:15:15.926356 kernel: SRBDS: Unknown: Dependent on hypervisor status May 10 01:15:15.926372 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 10 01:15:15.926383 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 10 01:15:15.926396 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 10 01:15:15.926407 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 10 01:15:15.926419 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 10 01:15:15.926431 kernel: Freeing SMP alternatives memory: 32K May 10 01:15:15.926443 kernel: pid_max: default: 32768 minimum: 301 May 10 01:15:15.926455 kernel: LSM: Security Framework initializing May 10 01:15:15.926466 kernel: SELinux: Initializing. May 10 01:15:15.926478 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 10 01:15:15.926490 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 10 01:15:15.926507 kernel: smpboot: CPU0: Intel Xeon E3-12xx v2 (Ivy Bridge, IBRS) (family: 0x6, model: 0x3a, stepping: 0x9) May 10 01:15:15.926519 kernel: Performance Events: unsupported p6 CPU model 58 no PMU driver, software events only. May 10 01:15:15.926531 kernel: signal: max sigframe size: 1776 May 10 01:15:15.926543 kernel: rcu: Hierarchical SRCU implementation. May 10 01:15:15.926555 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 10 01:15:15.926567 kernel: smp: Bringing up secondary CPUs ... May 10 01:15:15.926579 kernel: x86: Booting SMP configuration: May 10 01:15:15.926591 kernel: .... node #0, CPUs: #1 May 10 01:15:15.926603 kernel: kvm-clock: cpu 1, msr 29196041, secondary cpu clock May 10 01:15:15.926619 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 May 10 01:15:15.926631 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 May 10 01:15:15.926644 kernel: smp: Brought up 1 node, 2 CPUs May 10 01:15:15.926655 kernel: smpboot: Max logical packages: 16 May 10 01:15:15.926667 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) May 10 01:15:15.926679 kernel: devtmpfs: initialized May 10 01:15:15.926691 kernel: x86/mm: Memory block size: 128MB May 10 01:15:15.926703 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 01:15:15.926716 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) May 10 01:15:15.926732 kernel: pinctrl core: initialized pinctrl subsystem May 10 01:15:15.926744 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 01:15:15.926756 kernel: audit: initializing netlink subsys (disabled) May 10 01:15:15.926768 kernel: audit: type=2000 audit(1746839714.807:1): state=initialized audit_enabled=0 res=1 May 10 01:15:15.926780 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 01:15:15.926792 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 01:15:15.926804 kernel: cpuidle: using governor menu May 10 01:15:15.926816 kernel: ACPI: bus type PCI registered May 10 01:15:15.926828 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 01:15:15.926844 kernel: dca service started, version 1.12.1 May 10 01:15:15.926875 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 10 01:15:15.927691 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 10 01:15:15.927705 kernel: PCI: Using configuration type 1 for base access May 10 01:15:15.927717 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 01:15:15.927729 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 10 01:15:15.927741 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 01:15:15.927754 kernel: ACPI: Added _OSI(Module Device) May 10 01:15:15.927766 kernel: ACPI: Added _OSI(Processor Device) May 10 01:15:15.927785 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 01:15:15.927797 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 01:15:15.927810 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 01:15:15.927822 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 01:15:15.927834 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 01:15:15.927846 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 10 01:15:15.927904 kernel: ACPI: Interpreter enabled May 10 01:15:15.927921 kernel: ACPI: PM: (supports S0 S5) May 10 01:15:15.927933 kernel: ACPI: Using IOAPIC for interrupt routing May 10 01:15:15.927952 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 01:15:15.927964 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 10 01:15:15.927977 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 10 01:15:15.928231 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 10 01:15:15.928395 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 10 01:15:15.928550 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 10 01:15:15.928569 kernel: PCI host bridge to bus 0000:00 May 10 01:15:15.928738 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 10 01:15:15.928917 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 10 01:15:15.929061 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 10 01:15:15.929202 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] May 10 01:15:15.929342 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 10 01:15:15.929482 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] May 10 01:15:15.929623 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 10 01:15:15.929811 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 10 01:15:15.930025 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 May 10 01:15:15.930201 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] May 10 01:15:15.930362 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] May 10 01:15:15.930519 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] May 10 01:15:15.930676 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 10 01:15:15.930845 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 May 10 01:15:15.931039 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] May 10 01:15:15.931212 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 May 10 01:15:15.931370 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] May 10 01:15:15.931559 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 May 10 01:15:15.931716 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] May 10 01:15:15.931916 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 May 10 01:15:15.932083 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] May 10 01:15:15.932248 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 May 10 01:15:15.932405 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] May 10 01:15:15.932568 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 May 10 01:15:15.932747 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] May 10 01:15:15.940010 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 May 10 01:15:15.940205 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] May 10 01:15:15.940381 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 May 10 01:15:15.940546 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] May 10 01:15:15.940719 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 May 10 01:15:15.940915 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] May 10 01:15:15.941079 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] May 10 01:15:15.941245 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] May 10 01:15:15.941402 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] May 10 01:15:15.941571 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 May 10 01:15:15.941729 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] May 10 01:15:15.941916 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] May 10 01:15:15.942074 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] May 10 01:15:15.942268 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 10 01:15:15.942436 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 10 01:15:15.942614 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 10 01:15:15.942782 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] May 10 01:15:15.942990 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] May 10 01:15:15.943191 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 10 01:15:15.943369 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] May 10 01:15:15.943563 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 May 10 01:15:15.943749 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] May 10 01:15:15.943955 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] May 10 01:15:15.944136 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] May 10 01:15:15.944323 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] May 10 01:15:15.944533 kernel: pci_bus 0000:02: extended config space not accessible May 10 01:15:15.944762 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 May 10 01:15:15.944985 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] May 10 01:15:15.945150 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] May 10 01:15:15.945314 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] May 10 01:15:15.945488 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 May 10 01:15:15.945654 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] May 10 01:15:15.945814 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] May 10 01:15:15.945999 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] May 10 01:15:15.946186 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] May 10 01:15:15.946362 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 May 10 01:15:15.946528 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] May 10 01:15:15.946699 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] May 10 01:15:15.957914 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] May 10 01:15:15.958192 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] May 10 01:15:15.958362 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] May 10 01:15:15.958539 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] May 10 01:15:15.958700 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] May 10 01:15:15.958895 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] May 10 01:15:15.959061 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] May 10 01:15:15.959220 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] May 10 01:15:15.959379 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] May 10 01:15:15.959535 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] May 10 01:15:15.959691 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] May 10 01:15:15.959879 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] May 10 01:15:15.960042 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] May 10 01:15:15.960199 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] May 10 01:15:15.960359 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] May 10 01:15:15.960514 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] May 10 01:15:15.960669 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] May 10 01:15:15.960689 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 10 01:15:15.960702 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 10 01:15:15.960714 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 10 01:15:15.960733 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 10 01:15:15.960746 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 10 01:15:15.960758 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 10 01:15:15.960770 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 10 01:15:15.960783 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 10 01:15:15.960795 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 10 01:15:15.960807 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 10 01:15:15.960819 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 10 01:15:15.960832 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 10 01:15:15.960849 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 10 01:15:15.960890 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 10 01:15:15.960903 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 10 01:15:15.960916 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 10 01:15:15.960938 kernel: iommu: Default domain type: Translated May 10 01:15:15.960951 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 01:15:15.961131 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 10 01:15:15.961291 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 10 01:15:15.961454 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 10 01:15:15.961473 kernel: vgaarb: loaded May 10 01:15:15.961486 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 01:15:15.961499 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 01:15:15.961511 kernel: PTP clock support registered May 10 01:15:15.961523 kernel: PCI: Using ACPI for IRQ routing May 10 01:15:15.961536 kernel: PCI: pci_cache_line_size set to 64 bytes May 10 01:15:15.961548 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 10 01:15:15.961560 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] May 10 01:15:15.961578 kernel: clocksource: Switched to clocksource kvm-clock May 10 01:15:15.961591 kernel: VFS: Disk quotas dquot_6.6.0 May 10 01:15:15.961603 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 01:15:15.961615 kernel: pnp: PnP ACPI init May 10 01:15:15.961832 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved May 10 01:15:15.961854 kernel: pnp: PnP ACPI: found 5 devices May 10 01:15:15.961907 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 01:15:15.961920 kernel: NET: Registered PF_INET protocol family May 10 01:15:15.961945 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 10 01:15:15.961958 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 10 01:15:15.961971 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 01:15:15.961984 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 10 01:15:15.961996 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 10 01:15:15.962008 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 10 01:15:15.962021 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 10 01:15:15.962033 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 10 01:15:15.962046 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 01:15:15.962063 kernel: NET: Registered PF_XDP protocol family May 10 01:15:15.962223 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 May 10 01:15:15.962380 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 May 10 01:15:15.962536 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 May 10 01:15:15.962690 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 May 10 01:15:15.962844 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 May 10 01:15:15.963031 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 May 10 01:15:15.963188 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 May 10 01:15:15.963344 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 May 10 01:15:15.963500 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] May 10 01:15:15.963655 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] May 10 01:15:15.963811 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] May 10 01:15:15.964005 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] May 10 01:15:15.964171 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] May 10 01:15:15.964329 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] May 10 01:15:15.964487 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] May 10 01:15:15.964642 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] May 10 01:15:15.964809 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] May 10 01:15:15.974746 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] May 10 01:15:15.974966 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] May 10 01:15:15.975128 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] May 10 01:15:15.975296 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] May 10 01:15:15.975454 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] May 10 01:15:15.975619 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] May 10 01:15:15.975799 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] May 10 01:15:15.975984 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] May 10 01:15:15.976143 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] May 10 01:15:15.976325 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] May 10 01:15:15.976481 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] May 10 01:15:15.976637 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] May 10 01:15:15.976801 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] May 10 01:15:15.976985 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] May 10 01:15:15.977144 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] May 10 01:15:15.977311 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] May 10 01:15:15.977480 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] May 10 01:15:15.977638 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] May 10 01:15:15.977819 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] May 10 01:15:15.978005 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] May 10 01:15:15.978182 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] May 10 01:15:15.978341 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] May 10 01:15:15.978512 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] May 10 01:15:15.978672 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] May 10 01:15:15.978840 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] May 10 01:15:15.979034 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] May 10 01:15:15.979213 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] May 10 01:15:15.979382 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] May 10 01:15:15.979553 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] May 10 01:15:15.979711 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] May 10 01:15:15.979917 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] May 10 01:15:15.980089 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] May 10 01:15:15.980267 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] May 10 01:15:15.980430 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 10 01:15:15.980587 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 10 01:15:15.980742 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 10 01:15:15.980941 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] May 10 01:15:15.981087 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 10 01:15:15.981242 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] May 10 01:15:15.981407 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] May 10 01:15:15.981569 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] May 10 01:15:15.981722 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] May 10 01:15:15.982028 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] May 10 01:15:15.982194 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] May 10 01:15:15.982344 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] May 10 01:15:15.982491 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] May 10 01:15:15.982656 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] May 10 01:15:15.982806 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] May 10 01:15:15.982980 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] May 10 01:15:15.983140 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] May 10 01:15:15.983289 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] May 10 01:15:15.983436 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] May 10 01:15:15.983618 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] May 10 01:15:15.983775 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] May 10 01:15:15.983962 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] May 10 01:15:15.984122 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] May 10 01:15:15.984271 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] May 10 01:15:15.984418 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] May 10 01:15:15.984573 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] May 10 01:15:15.984722 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] May 10 01:15:15.984901 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] May 10 01:15:15.985073 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] May 10 01:15:15.985225 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] May 10 01:15:15.985374 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] May 10 01:15:15.985394 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 10 01:15:15.985408 kernel: PCI: CLS 0 bytes, default 64 May 10 01:15:15.985422 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 10 01:15:15.985435 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) May 10 01:15:15.985454 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 10 01:15:15.985468 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns May 10 01:15:15.985481 kernel: Initialise system trusted keyrings May 10 01:15:15.985494 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 10 01:15:15.985507 kernel: Key type asymmetric registered May 10 01:15:15.985520 kernel: Asymmetric key parser 'x509' registered May 10 01:15:15.985533 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 01:15:15.985546 kernel: io scheduler mq-deadline registered May 10 01:15:15.985562 kernel: io scheduler kyber registered May 10 01:15:15.985576 kernel: io scheduler bfq registered May 10 01:15:15.985731 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 May 10 01:15:15.985915 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 May 10 01:15:15.986075 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ May 10 01:15:15.986232 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 May 10 01:15:15.986388 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 May 10 01:15:15.986543 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ May 10 01:15:15.986706 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 May 10 01:15:15.986894 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 May 10 01:15:15.987055 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ May 10 01:15:15.987211 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 May 10 01:15:15.987367 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 May 10 01:15:15.987524 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ May 10 01:15:15.987689 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 May 10 01:15:15.987846 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 May 10 01:15:15.988034 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ May 10 01:15:15.988194 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 May 10 01:15:15.988349 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 May 10 01:15:15.988503 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ May 10 01:15:15.988679 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 May 10 01:15:15.988839 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 May 10 01:15:15.995780 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ May 10 01:15:15.995989 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 May 10 01:15:15.996152 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 May 10 01:15:15.996309 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ May 10 01:15:15.996339 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 01:15:15.996354 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 10 01:15:15.996367 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 10 01:15:15.996380 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 01:15:15.996393 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 01:15:15.996406 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 10 01:15:15.996419 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 10 01:15:15.996437 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 10 01:15:15.996606 kernel: rtc_cmos 00:03: RTC can wake from S4 May 10 01:15:15.996628 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 10 01:15:15.996771 kernel: rtc_cmos 00:03: registered as rtc0 May 10 01:15:15.996946 kernel: rtc_cmos 00:03: setting system clock to 2025-05-10T01:15:15 UTC (1746839715) May 10 01:15:15.997094 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram May 10 01:15:15.997114 kernel: intel_pstate: CPU model not supported May 10 01:15:15.997127 kernel: NET: Registered PF_INET6 protocol family May 10 01:15:15.997146 kernel: Segment Routing with IPv6 May 10 01:15:15.997159 kernel: In-situ OAM (IOAM) with IPv6 May 10 01:15:15.997173 kernel: NET: Registered PF_PACKET protocol family May 10 01:15:15.997190 kernel: Key type dns_resolver registered May 10 01:15:15.997203 kernel: IPI shorthand broadcast: enabled May 10 01:15:15.997216 kernel: sched_clock: Marking stable (968436703, 221958345)->(1486492247, -296097199) May 10 01:15:15.997229 kernel: registered taskstats version 1 May 10 01:15:15.997242 kernel: Loading compiled-in X.509 certificates May 10 01:15:15.997254 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 01:15:15.997271 kernel: Key type .fscrypt registered May 10 01:15:15.997284 kernel: Key type fscrypt-provisioning registered May 10 01:15:15.997297 kernel: ima: No TPM chip found, activating TPM-bypass! May 10 01:15:15.997309 kernel: ima: Allocated hash algorithm: sha1 May 10 01:15:15.997322 kernel: ima: No architecture policies found May 10 01:15:15.997335 kernel: clk: Disabling unused clocks May 10 01:15:15.997348 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 01:15:15.997361 kernel: Write protecting the kernel read-only data: 28672k May 10 01:15:15.997374 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 01:15:15.997391 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 01:15:15.997404 kernel: Run /init as init process May 10 01:15:15.997417 kernel: with arguments: May 10 01:15:15.997431 kernel: /init May 10 01:15:15.997443 kernel: with environment: May 10 01:15:15.997456 kernel: HOME=/ May 10 01:15:15.997468 kernel: TERM=linux May 10 01:15:15.997481 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 01:15:15.997505 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 01:15:15.997529 systemd[1]: Detected virtualization kvm. May 10 01:15:15.997544 systemd[1]: Detected architecture x86-64. May 10 01:15:15.997557 systemd[1]: Running in initrd. May 10 01:15:15.997570 systemd[1]: No hostname configured, using default hostname. May 10 01:15:15.997584 systemd[1]: Hostname set to . May 10 01:15:15.997598 systemd[1]: Initializing machine ID from VM UUID. May 10 01:15:15.997611 systemd[1]: Queued start job for default target initrd.target. May 10 01:15:15.997629 systemd[1]: Started systemd-ask-password-console.path. May 10 01:15:15.997647 systemd[1]: Reached target cryptsetup.target. May 10 01:15:15.997661 systemd[1]: Reached target paths.target. May 10 01:15:15.997674 systemd[1]: Reached target slices.target. May 10 01:15:15.997688 systemd[1]: Reached target swap.target. May 10 01:15:15.997701 systemd[1]: Reached target timers.target. May 10 01:15:15.997715 systemd[1]: Listening on iscsid.socket. May 10 01:15:15.997728 systemd[1]: Listening on iscsiuio.socket. May 10 01:15:15.997747 systemd[1]: Listening on systemd-journald-audit.socket. May 10 01:15:15.997761 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 01:15:15.997774 systemd[1]: Listening on systemd-journald.socket. May 10 01:15:15.997788 systemd[1]: Listening on systemd-networkd.socket. May 10 01:15:15.997801 systemd[1]: Listening on systemd-udevd-control.socket. May 10 01:15:15.997815 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 01:15:15.997828 systemd[1]: Reached target sockets.target. May 10 01:15:15.997842 systemd[1]: Starting kmod-static-nodes.service... May 10 01:15:15.997855 systemd[1]: Finished network-cleanup.service. May 10 01:15:15.997904 systemd[1]: Starting systemd-fsck-usr.service... May 10 01:15:15.997918 systemd[1]: Starting systemd-journald.service... May 10 01:15:15.997932 systemd[1]: Starting systemd-modules-load.service... May 10 01:15:15.997946 systemd[1]: Starting systemd-resolved.service... May 10 01:15:15.997960 systemd[1]: Starting systemd-vconsole-setup.service... May 10 01:15:15.997973 systemd[1]: Finished kmod-static-nodes.service. May 10 01:15:15.997986 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 01:15:15.998011 systemd-journald[202]: Journal started May 10 01:15:15.998096 systemd-journald[202]: Runtime Journal (/run/log/journal/e2e58a0ca6cd4f45a170aec54b5690a7) is 4.7M, max 38.1M, 33.3M free. May 10 01:15:15.922426 systemd-modules-load[203]: Inserted module 'overlay' May 10 01:15:16.016255 kernel: Bridge firewalling registered May 10 01:15:15.972713 systemd-resolved[204]: Positive Trust Anchors: May 10 01:15:16.030258 systemd[1]: Started systemd-resolved.service. May 10 01:15:16.030292 kernel: audit: type=1130 audit(1746839716.015:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:16.030314 kernel: audit: type=1130 audit(1746839716.023:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:16.030343 systemd[1]: Started systemd-journald.service. May 10 01:15:16.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:16.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:15.972732 systemd-resolved[204]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 01:15:15.972778 systemd-resolved[204]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 01:15:16.052831 kernel: SCSI subsystem initialized May 10 01:15:16.052892 kernel: audit: type=1130 audit(1746839716.034:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:16.052931 kernel: audit: type=1130 audit(1746839716.041:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:16.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:16.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:15.980673 systemd-resolved[204]: Defaulting to hostname 'linux'. May 10 01:15:16.066949 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 01:15:16.066990 kernel: device-mapper: uevent: version 1.0.3 May 10 01:15:16.067010 kernel: audit: type=1130 audit(1746839716.056:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:16.067035 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 01:15:16.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:16.004308 systemd-modules-load[203]: Inserted module 'br_netfilter' May 10 01:15:16.035454 systemd[1]: Finished systemd-fsck-usr.service. May 10 01:15:16.042257 systemd[1]: Finished systemd-vconsole-setup.service. May 10 01:15:16.057106 systemd[1]: Reached target nss-lookup.target. May 10 01:15:16.066679 systemd[1]: Starting dracut-cmdline-ask.service... May 10 01:15:16.068410 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 01:15:16.068757 systemd-modules-load[203]: Inserted module 'dm_multipath' May 10 01:15:16.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:16.076808 systemd[1]: Finished systemd-modules-load.service. May 10 01:15:16.084431 kernel: audit: type=1130 audit(1746839716.076:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:16.077667 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 01:15:16.084382 systemd[1]: Starting systemd-sysctl.service... May 10 01:15:16.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:16.096838 systemd[1]: Finished dracut-cmdline-ask.service. May 10 01:15:16.102878 kernel: audit: type=1130 audit(1746839716.077:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:16.102914 kernel: audit: type=1130 audit(1746839716.096:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:16.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:16.097772 systemd[1]: Finished systemd-sysctl.service. May 10 01:15:16.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:16.104673 systemd[1]: Starting dracut-cmdline.service... May 10 01:15:16.123815 kernel: audit: type=1130 audit(1746839716.102:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:16.123846 dracut-cmdline[225]: dracut-dracut-053 May 10 01:15:16.123846 dracut-cmdline[225]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA May 10 01:15:16.123846 dracut-cmdline[225]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 01:15:16.205949 kernel: Loading iSCSI transport class v2.0-870. May 10 01:15:16.227947 kernel: iscsi: registered transport (tcp) May 10 01:15:16.256057 kernel: iscsi: registered transport (qla4xxx) May 10 01:15:16.256133 kernel: QLogic iSCSI HBA Driver May 10 01:15:16.306014 systemd[1]: Finished dracut-cmdline.service. May 10 01:15:16.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:16.308426 systemd[1]: Starting dracut-pre-udev.service... May 10 01:15:16.367939 kernel: raid6: sse2x4 gen() 13825 MB/s May 10 01:15:16.385904 kernel: raid6: sse2x4 xor() 7845 MB/s May 10 01:15:16.403908 kernel: raid6: sse2x2 gen() 9612 MB/s May 10 01:15:16.421905 kernel: raid6: sse2x2 xor() 7902 MB/s May 10 01:15:16.439936 kernel: raid6: sse2x1 gen() 9843 MB/s May 10 01:15:16.458613 kernel: raid6: sse2x1 xor() 7176 MB/s May 10 01:15:16.458706 kernel: raid6: using algorithm sse2x4 gen() 13825 MB/s May 10 01:15:16.458727 kernel: raid6: .... xor() 7845 MB/s, rmw enabled May 10 01:15:16.459948 kernel: raid6: using ssse3x2 recovery algorithm May 10 01:15:16.477918 kernel: xor: automatically using best checksumming function avx May 10 01:15:16.594898 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 01:15:16.607691 systemd[1]: Finished dracut-pre-udev.service. May 10 01:15:16.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:16.608000 audit: BPF prog-id=7 op=LOAD May 10 01:15:16.608000 audit: BPF prog-id=8 op=LOAD May 10 01:15:16.609645 systemd[1]: Starting systemd-udevd.service... May 10 01:15:16.627258 systemd-udevd[402]: Using default interface naming scheme 'v252'. May 10 01:15:16.636224 systemd[1]: Started systemd-udevd.service. May 10 01:15:16.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:16.641455 systemd[1]: Starting dracut-pre-trigger.service... May 10 01:15:16.658902 dracut-pre-trigger[412]: rd.md=0: removing MD RAID activation May 10 01:15:16.698809 systemd[1]: Finished dracut-pre-trigger.service. May 10 01:15:16.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:16.700694 systemd[1]: Starting systemd-udev-trigger.service... May 10 01:15:16.792427 systemd[1]: Finished systemd-udev-trigger.service. May 10 01:15:16.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:16.887928 kernel: cryptd: max_cpu_qlen set to 1000 May 10 01:15:16.901737 kernel: AVX version of gcm_enc/dec engaged. May 10 01:15:16.901801 kernel: AES CTR mode by8 optimization enabled May 10 01:15:16.907238 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) May 10 01:15:16.958926 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 10 01:15:16.958952 kernel: GPT:17805311 != 125829119 May 10 01:15:16.958969 kernel: GPT:Alternate GPT header not at the end of the disk. May 10 01:15:16.958985 kernel: GPT:17805311 != 125829119 May 10 01:15:16.959001 kernel: GPT: Use GNU Parted to correct GPT errors. May 10 01:15:16.959017 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 01:15:16.959034 kernel: ACPI: bus type USB registered May 10 01:15:16.959050 kernel: libata version 3.00 loaded. May 10 01:15:16.961949 kernel: usbcore: registered new interface driver usbfs May 10 01:15:16.961983 kernel: usbcore: registered new interface driver hub May 10 01:15:16.962023 kernel: usbcore: registered new device driver usb May 10 01:15:16.981888 kernel: ahci 0000:00:1f.2: version 3.0 May 10 01:15:17.011349 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 10 01:15:17.011377 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 10 01:15:17.011561 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 10 01:15:17.011734 kernel: scsi host0: ahci May 10 01:15:17.011981 kernel: scsi host1: ahci May 10 01:15:17.012174 kernel: scsi host2: ahci May 10 01:15:17.012354 kernel: scsi host3: ahci May 10 01:15:17.012534 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (460) May 10 01:15:17.012555 kernel: scsi host4: ahci May 10 01:15:17.012731 kernel: scsi host5: ahci May 10 01:15:17.012956 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 38 May 10 01:15:17.012976 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 38 May 10 01:15:17.012993 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 38 May 10 01:15:17.013010 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 38 May 10 01:15:17.013028 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 38 May 10 01:15:17.013044 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 38 May 10 01:15:17.005530 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 01:15:17.097637 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 01:15:17.103014 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 01:15:17.111829 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 01:15:17.117251 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 01:15:17.119451 systemd[1]: Starting disk-uuid.service... May 10 01:15:17.127069 disk-uuid[534]: Primary Header is updated. May 10 01:15:17.127069 disk-uuid[534]: Secondary Entries is updated. May 10 01:15:17.127069 disk-uuid[534]: Secondary Header is updated. May 10 01:15:17.131886 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 01:15:17.139444 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 01:15:17.324160 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 10 01:15:17.324249 kernel: ata3: SATA link down (SStatus 0 SControl 300) May 10 01:15:17.324883 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 10 01:15:17.332921 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 10 01:15:17.332966 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 10 01:15:17.335989 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 10 01:15:17.347559 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller May 10 01:15:17.364066 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 May 10 01:15:17.364276 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 May 10 01:15:17.364454 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller May 10 01:15:17.364629 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 May 10 01:15:17.364817 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed May 10 01:15:17.365054 kernel: hub 1-0:1.0: USB hub found May 10 01:15:17.365269 kernel: hub 1-0:1.0: 4 ports detected May 10 01:15:17.365461 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. May 10 01:15:17.365679 kernel: hub 2-0:1.0: USB hub found May 10 01:15:17.365937 kernel: hub 2-0:1.0: 4 ports detected May 10 01:15:17.598955 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd May 10 01:15:17.738893 kernel: hid: raw HID events driver (C) Jiri Kosina May 10 01:15:17.746493 kernel: usbcore: registered new interface driver usbhid May 10 01:15:17.746552 kernel: usbhid: USB HID core driver May 10 01:15:17.756528 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input3 May 10 01:15:17.756584 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 May 10 01:15:18.144436 disk-uuid[535]: The operation has completed successfully. May 10 01:15:18.145472 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 01:15:18.206471 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 01:15:18.207639 systemd[1]: Finished disk-uuid.service. May 10 01:15:18.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:18.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:18.210230 systemd[1]: Starting verity-setup.service... May 10 01:15:18.228884 kernel: device-mapper: verity: sha256 using implementation "sha256-avx" May 10 01:15:18.293549 systemd[1]: Found device dev-mapper-usr.device. May 10 01:15:18.295258 systemd[1]: Mounting sysusr-usr.mount... May 10 01:15:18.297288 systemd[1]: Finished verity-setup.service. May 10 01:15:18.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:18.391884 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 01:15:18.392191 systemd[1]: Mounted sysusr-usr.mount. May 10 01:15:18.393063 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 10 01:15:18.394167 systemd[1]: Starting ignition-setup.service... May 10 01:15:18.397340 systemd[1]: Starting parse-ip-for-networkd.service... May 10 01:15:18.415907 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 01:15:18.415985 kernel: BTRFS info (device vda6): using free space tree May 10 01:15:18.416016 kernel: BTRFS info (device vda6): has skinny extents May 10 01:15:18.440715 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 01:15:18.455288 systemd[1]: Finished ignition-setup.service. May 10 01:15:18.457177 systemd[1]: Starting ignition-fetch-offline.service... May 10 01:15:18.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:18.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:18.548012 systemd[1]: Finished parse-ip-for-networkd.service. May 10 01:15:18.550000 audit: BPF prog-id=9 op=LOAD May 10 01:15:18.552148 systemd[1]: Starting systemd-networkd.service... May 10 01:15:18.582803 systemd-networkd[710]: lo: Link UP May 10 01:15:18.582830 systemd-networkd[710]: lo: Gained carrier May 10 01:15:18.583718 systemd-networkd[710]: Enumeration completed May 10 01:15:18.584105 systemd-networkd[710]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 01:15:18.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:18.585617 systemd-networkd[710]: eth0: Link UP May 10 01:15:18.585623 systemd-networkd[710]: eth0: Gained carrier May 10 01:15:18.587564 systemd[1]: Started systemd-networkd.service. May 10 01:15:18.588959 systemd[1]: Reached target network.target. May 10 01:15:18.590922 systemd[1]: Starting iscsiuio.service... May 10 01:15:18.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:18.611000 systemd[1]: Started iscsiuio.service. May 10 01:15:18.613284 systemd[1]: Starting iscsid.service... May 10 01:15:18.621524 iscsid[715]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 01:15:18.621524 iscsid[715]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 01:15:18.621524 iscsid[715]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 01:15:18.621524 iscsid[715]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 01:15:18.621524 iscsid[715]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 01:15:18.621524 iscsid[715]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 01:15:18.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:18.623358 systemd[1]: Started iscsid.service. May 10 01:15:18.628550 systemd[1]: Starting dracut-initqueue.service... May 10 01:15:18.631017 systemd-networkd[710]: eth0: DHCPv4 address 10.244.17.126/30, gateway 10.244.17.125 acquired from 10.244.17.125 May 10 01:15:18.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:18.651087 systemd[1]: Finished dracut-initqueue.service. May 10 01:15:18.651957 systemd[1]: Reached target remote-fs-pre.target. May 10 01:15:18.652564 systemd[1]: Reached target remote-cryptsetup.target. May 10 01:15:18.653481 systemd[1]: Reached target remote-fs.target. May 10 01:15:18.658175 systemd[1]: Starting dracut-pre-mount.service... May 10 01:15:18.676259 systemd[1]: Finished dracut-pre-mount.service. May 10 01:15:18.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:18.694640 ignition[640]: Ignition 2.14.0 May 10 01:15:18.695798 ignition[640]: Stage: fetch-offline May 10 01:15:18.695960 ignition[640]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 01:15:18.696001 ignition[640]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 10 01:15:18.697760 ignition[640]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 10 01:15:18.697952 ignition[640]: parsed url from cmdline: "" May 10 01:15:18.699528 systemd[1]: Finished ignition-fetch-offline.service. May 10 01:15:18.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:18.697960 ignition[640]: no config URL provided May 10 01:15:18.701722 systemd[1]: Starting ignition-fetch.service... May 10 01:15:18.697970 ignition[640]: reading system config file "/usr/lib/ignition/user.ign" May 10 01:15:18.697987 ignition[640]: no config at "/usr/lib/ignition/user.ign" May 10 01:15:18.697996 ignition[640]: failed to fetch config: resource requires networking May 10 01:15:18.698521 ignition[640]: Ignition finished successfully May 10 01:15:18.712254 ignition[729]: Ignition 2.14.0 May 10 01:15:18.712271 ignition[729]: Stage: fetch May 10 01:15:18.712435 ignition[729]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 01:15:18.712472 ignition[729]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 10 01:15:18.713782 ignition[729]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 10 01:15:18.713955 ignition[729]: parsed url from cmdline: "" May 10 01:15:18.713962 ignition[729]: no config URL provided May 10 01:15:18.713973 ignition[729]: reading system config file "/usr/lib/ignition/user.ign" May 10 01:15:18.713989 ignition[729]: no config at "/usr/lib/ignition/user.ign" May 10 01:15:18.719745 ignition[729]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... May 10 01:15:18.719773 ignition[729]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... May 10 01:15:18.721232 ignition[729]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 May 10 01:15:18.740550 ignition[729]: GET result: OK May 10 01:15:18.740762 ignition[729]: parsing config with SHA512: ae6b583f8f03b1e55f7d9b62611976e352746e4d4388e3e833e487bb1c4cc424f97b7a35a2e1caed8c1c5348ea5ae8f7f45ee6173aa53226a0345103744dbcc9 May 10 01:15:18.750550 unknown[729]: fetched base config from "system" May 10 01:15:18.750570 unknown[729]: fetched base config from "system" May 10 01:15:18.751133 ignition[729]: fetch: fetch complete May 10 01:15:18.750579 unknown[729]: fetched user config from "openstack" May 10 01:15:18.751142 ignition[729]: fetch: fetch passed May 10 01:15:18.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:18.753290 systemd[1]: Finished ignition-fetch.service. May 10 01:15:18.751202 ignition[729]: Ignition finished successfully May 10 01:15:18.755121 systemd[1]: Starting ignition-kargs.service... May 10 01:15:18.769178 ignition[735]: Ignition 2.14.0 May 10 01:15:18.769938 ignition[735]: Stage: kargs May 10 01:15:18.770177 ignition[735]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 01:15:18.770214 ignition[735]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 10 01:15:18.771597 ignition[735]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 10 01:15:18.773197 ignition[735]: kargs: kargs passed May 10 01:15:18.773293 ignition[735]: Ignition finished successfully May 10 01:15:18.774288 systemd[1]: Finished ignition-kargs.service. May 10 01:15:18.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:18.776506 systemd[1]: Starting ignition-disks.service... May 10 01:15:18.786666 ignition[740]: Ignition 2.14.0 May 10 01:15:18.786690 ignition[740]: Stage: disks May 10 01:15:18.786869 ignition[740]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 01:15:18.786923 ignition[740]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 10 01:15:18.788584 ignition[740]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 10 01:15:18.789740 ignition[740]: disks: disks passed May 10 01:15:18.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:18.790690 systemd[1]: Finished ignition-disks.service. May 10 01:15:18.789807 ignition[740]: Ignition finished successfully May 10 01:15:18.791830 systemd[1]: Reached target initrd-root-device.target. May 10 01:15:18.792531 systemd[1]: Reached target local-fs-pre.target. May 10 01:15:18.793792 systemd[1]: Reached target local-fs.target. May 10 01:15:18.795148 systemd[1]: Reached target sysinit.target. May 10 01:15:18.796391 systemd[1]: Reached target basic.target. May 10 01:15:18.798872 systemd[1]: Starting systemd-fsck-root.service... May 10 01:15:18.821410 systemd-fsck[747]: ROOT: clean, 623/1628000 files, 124060/1617920 blocks May 10 01:15:18.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:18.825660 systemd[1]: Finished systemd-fsck-root.service. May 10 01:15:18.828662 systemd[1]: Mounting sysroot.mount... May 10 01:15:18.840004 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 01:15:18.841179 systemd[1]: Mounted sysroot.mount. May 10 01:15:18.842742 systemd[1]: Reached target initrd-root-fs.target. May 10 01:15:18.845587 systemd[1]: Mounting sysroot-usr.mount... May 10 01:15:18.847287 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 10 01:15:18.848194 systemd[1]: Starting flatcar-openstack-hostname.service... May 10 01:15:18.849020 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 01:15:18.849074 systemd[1]: Reached target ignition-diskful.target. May 10 01:15:18.854842 systemd[1]: Mounted sysroot-usr.mount. May 10 01:15:18.857373 systemd[1]: Starting initrd-setup-root.service... May 10 01:15:18.865269 initrd-setup-root[758]: cut: /sysroot/etc/passwd: No such file or directory May 10 01:15:18.884689 initrd-setup-root[766]: cut: /sysroot/etc/group: No such file or directory May 10 01:15:18.894450 initrd-setup-root[774]: cut: /sysroot/etc/shadow: No such file or directory May 10 01:15:18.905233 initrd-setup-root[783]: cut: /sysroot/etc/gshadow: No such file or directory May 10 01:15:18.965802 systemd[1]: Finished initrd-setup-root.service. May 10 01:15:18.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:18.967873 systemd[1]: Starting ignition-mount.service... May 10 01:15:18.969470 systemd[1]: Starting sysroot-boot.service... May 10 01:15:18.978813 bash[801]: umount: /sysroot/usr/share/oem: not mounted. May 10 01:15:18.999970 ignition[802]: INFO : Ignition 2.14.0 May 10 01:15:19.002554 systemd[1]: Finished sysroot-boot.service. May 10 01:15:19.003909 ignition[802]: INFO : Stage: mount May 10 01:15:19.003909 ignition[802]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 01:15:19.003909 ignition[802]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 10 01:15:19.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:19.008183 ignition[802]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 10 01:15:19.012248 ignition[802]: INFO : mount: mount passed May 10 01:15:19.012943 ignition[802]: INFO : Ignition finished successfully May 10 01:15:19.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:19.013193 systemd[1]: Finished ignition-mount.service. May 10 01:15:19.023104 coreos-metadata[753]: May 10 01:15:19.023 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 May 10 01:15:19.040123 coreos-metadata[753]: May 10 01:15:19.040 INFO Fetch successful May 10 01:15:19.041223 coreos-metadata[753]: May 10 01:15:19.041 INFO wrote hostname srv-2kvu9.gb1.brightbox.com to /sysroot/etc/hostname May 10 01:15:19.044417 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. May 10 01:15:19.044574 systemd[1]: Finished flatcar-openstack-hostname.service. May 10 01:15:19.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:19.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:19.318123 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 01:15:19.330286 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (810) May 10 01:15:19.334120 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 01:15:19.334163 kernel: BTRFS info (device vda6): using free space tree May 10 01:15:19.334183 kernel: BTRFS info (device vda6): has skinny extents May 10 01:15:19.342362 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 01:15:19.344330 systemd[1]: Starting ignition-files.service... May 10 01:15:19.367240 ignition[830]: INFO : Ignition 2.14.0 May 10 01:15:19.368395 ignition[830]: INFO : Stage: files May 10 01:15:19.369269 ignition[830]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 01:15:19.370197 ignition[830]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 10 01:15:19.371499 ignition[830]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 10 01:15:19.373741 ignition[830]: DEBUG : files: compiled without relabeling support, skipping May 10 01:15:19.374935 ignition[830]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 01:15:19.374935 ignition[830]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 01:15:19.378539 ignition[830]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 01:15:19.379751 ignition[830]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 01:15:19.381280 unknown[830]: wrote ssh authorized keys file for user: core May 10 01:15:19.382280 ignition[830]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 01:15:19.383216 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 01:15:19.383216 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 10 01:15:19.613518 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 10 01:15:19.835310 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 01:15:19.837131 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 10 01:15:19.838287 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 10 01:15:19.838287 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 10 01:15:19.840495 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 10 01:15:19.840495 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 01:15:19.840495 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 01:15:19.840495 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 01:15:19.840495 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 01:15:19.840495 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 01:15:19.840495 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 01:15:19.840495 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 01:15:19.840495 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 01:15:19.840495 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 01:15:19.840495 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 May 10 01:15:19.955224 systemd-networkd[710]: eth0: Gained IPv6LL May 10 01:15:20.391877 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 10 01:15:21.465541 systemd-networkd[710]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:45f:24:19ff:fef4:117e/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:45f:24:19ff:fef4:117e/64 assigned by NDisc. May 10 01:15:21.465555 systemd-networkd[710]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. May 10 01:15:21.596762 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 01:15:21.596762 ignition[830]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" May 10 01:15:21.596762 ignition[830]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" May 10 01:15:21.600753 ignition[830]: INFO : files: op(c): [started] processing unit "prepare-helm.service" May 10 01:15:21.600753 ignition[830]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 01:15:21.600753 ignition[830]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 01:15:21.600753 ignition[830]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" May 10 01:15:21.600753 ignition[830]: INFO : files: op(e): [started] setting preset to enabled for "prepare-helm.service" May 10 01:15:21.600753 ignition[830]: INFO : files: op(e): [finished] setting preset to enabled for "prepare-helm.service" May 10 01:15:21.600753 ignition[830]: INFO : files: op(f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 01:15:21.600753 ignition[830]: INFO : files: op(f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 01:15:21.610107 ignition[830]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 01:15:21.610107 ignition[830]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 01:15:21.610107 ignition[830]: INFO : files: files passed May 10 01:15:21.610107 ignition[830]: INFO : Ignition finished successfully May 10 01:15:21.613467 systemd[1]: Finished ignition-files.service. May 10 01:15:21.626830 kernel: kauditd_printk_skb: 28 callbacks suppressed May 10 01:15:21.626883 kernel: audit: type=1130 audit(1746839721.615:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.617448 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 01:15:21.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.623970 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 01:15:21.640810 kernel: audit: type=1130 audit(1746839721.628:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.640894 kernel: audit: type=1131 audit(1746839721.633:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.641159 initrd-setup-root-after-ignition[855]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 01:15:21.648007 kernel: audit: type=1130 audit(1746839721.640:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.625126 systemd[1]: Starting ignition-quench.service... May 10 01:15:21.628910 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 01:15:21.629058 systemd[1]: Finished ignition-quench.service. May 10 01:15:21.635344 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 01:15:21.642078 systemd[1]: Reached target ignition-complete.target. May 10 01:15:21.650374 systemd[1]: Starting initrd-parse-etc.service... May 10 01:15:21.672501 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 01:15:21.673617 systemd[1]: Finished initrd-parse-etc.service. May 10 01:15:21.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.675205 systemd[1]: Reached target initrd-fs.target. May 10 01:15:21.686469 kernel: audit: type=1130 audit(1746839721.674:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.686517 kernel: audit: type=1131 audit(1746839721.674:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.687496 systemd[1]: Reached target initrd.target. May 10 01:15:21.689004 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 01:15:21.691731 systemd[1]: Starting dracut-pre-pivot.service... May 10 01:15:21.710670 systemd[1]: Finished dracut-pre-pivot.service. May 10 01:15:21.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.714583 systemd[1]: Starting initrd-cleanup.service... May 10 01:15:21.718549 kernel: audit: type=1130 audit(1746839721.711:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.730876 systemd[1]: Stopped target nss-lookup.target. May 10 01:15:21.731880 systemd[1]: Stopped target remote-cryptsetup.target. May 10 01:15:21.732628 systemd[1]: Stopped target timers.target. May 10 01:15:21.757011 kernel: audit: type=1131 audit(1746839721.750:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.734034 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 01:15:21.734237 systemd[1]: Stopped dracut-pre-pivot.service. May 10 01:15:21.751965 systemd[1]: Stopped target initrd.target. May 10 01:15:21.757925 systemd[1]: Stopped target basic.target. May 10 01:15:21.759154 systemd[1]: Stopped target ignition-complete.target. May 10 01:15:21.760416 systemd[1]: Stopped target ignition-diskful.target. May 10 01:15:21.761710 systemd[1]: Stopped target initrd-root-device.target. May 10 01:15:21.763373 systemd[1]: Stopped target remote-fs.target. May 10 01:15:21.764613 systemd[1]: Stopped target remote-fs-pre.target. May 10 01:15:21.766046 systemd[1]: Stopped target sysinit.target. May 10 01:15:21.767312 systemd[1]: Stopped target local-fs.target. May 10 01:15:21.768755 systemd[1]: Stopped target local-fs-pre.target. May 10 01:15:21.778043 kernel: audit: type=1131 audit(1746839721.771:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.770108 systemd[1]: Stopped target swap.target. May 10 01:15:21.771383 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 01:15:21.786876 kernel: audit: type=1131 audit(1746839721.779:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.771653 systemd[1]: Stopped dracut-pre-mount.service. May 10 01:15:21.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.773023 systemd[1]: Stopped target cryptsetup.target. May 10 01:15:21.778783 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 01:15:21.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.779067 systemd[1]: Stopped dracut-initqueue.service. May 10 01:15:21.796532 iscsid[715]: iscsid shutting down. May 10 01:15:21.783179 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 01:15:21.783442 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 01:15:21.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.786762 systemd[1]: ignition-files.service: Deactivated successfully. May 10 01:15:21.786977 systemd[1]: Stopped ignition-files.service. May 10 01:15:21.789325 systemd[1]: Stopping ignition-mount.service... May 10 01:15:21.791622 systemd[1]: Stopping iscsid.service... May 10 01:15:21.792258 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 01:15:21.814303 ignition[868]: INFO : Ignition 2.14.0 May 10 01:15:21.814303 ignition[868]: INFO : Stage: umount May 10 01:15:21.814303 ignition[868]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 01:15:21.814303 ignition[868]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 10 01:15:21.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.792435 systemd[1]: Stopped kmod-static-nodes.service. May 10 01:15:21.830407 ignition[868]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 10 01:15:21.830407 ignition[868]: INFO : umount: umount passed May 10 01:15:21.830407 ignition[868]: INFO : Ignition finished successfully May 10 01:15:21.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.795735 systemd[1]: Stopping sysroot-boot.service... May 10 01:15:21.797561 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 01:15:21.797828 systemd[1]: Stopped systemd-udev-trigger.service. May 10 01:15:21.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.800543 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 01:15:21.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.800734 systemd[1]: Stopped dracut-pre-trigger.service. May 10 01:15:21.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.816800 systemd[1]: iscsid.service: Deactivated successfully. May 10 01:15:21.817011 systemd[1]: Stopped iscsid.service. May 10 01:15:21.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.820033 systemd[1]: Stopping iscsiuio.service... May 10 01:15:21.826462 systemd[1]: iscsiuio.service: Deactivated successfully. May 10 01:15:21.826663 systemd[1]: Stopped iscsiuio.service. May 10 01:15:21.827625 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 01:15:21.827747 systemd[1]: Finished initrd-cleanup.service. May 10 01:15:21.828842 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 01:15:21.830047 systemd[1]: Stopped ignition-mount.service. May 10 01:15:21.835480 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 10 01:15:21.837072 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 01:15:21.837152 systemd[1]: Stopped ignition-disks.service. May 10 01:15:21.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.838743 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 01:15:21.838850 systemd[1]: Stopped ignition-kargs.service. May 10 01:15:21.839902 systemd[1]: ignition-fetch.service: Deactivated successfully. May 10 01:15:21.839966 systemd[1]: Stopped ignition-fetch.service. May 10 01:15:21.842142 systemd[1]: Stopped target network.target. May 10 01:15:21.843356 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 01:15:21.843436 systemd[1]: Stopped ignition-fetch-offline.service. May 10 01:15:21.844685 systemd[1]: Stopped target paths.target. May 10 01:15:21.845813 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 01:15:21.850004 systemd[1]: Stopped systemd-ask-password-console.path. May 10 01:15:21.850663 systemd[1]: Stopped target slices.target. May 10 01:15:21.852489 systemd[1]: Stopped target sockets.target. May 10 01:15:21.853245 systemd[1]: iscsid.socket: Deactivated successfully. May 10 01:15:21.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.853314 systemd[1]: Closed iscsid.socket. May 10 01:15:21.854515 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 01:15:21.854578 systemd[1]: Closed iscsiuio.socket. May 10 01:15:21.855869 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 01:15:21.855957 systemd[1]: Stopped ignition-setup.service. May 10 01:15:21.856963 systemd[1]: Stopping systemd-networkd.service... May 10 01:15:21.859710 systemd[1]: Stopping systemd-resolved.service... May 10 01:15:21.867017 systemd-networkd[710]: eth0: DHCPv6 lease lost May 10 01:15:21.881000 audit: BPF prog-id=9 op=UNLOAD May 10 01:15:21.868386 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 01:15:21.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.868558 systemd[1]: Stopped systemd-networkd.service. May 10 01:15:21.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.873061 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 01:15:21.873120 systemd[1]: Closed systemd-networkd.socket. May 10 01:15:21.879027 systemd[1]: Stopping network-cleanup.service... May 10 01:15:21.882946 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 01:15:21.883024 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 01:15:21.884101 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 01:15:21.884166 systemd[1]: Stopped systemd-sysctl.service. May 10 01:15:21.886492 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 01:15:21.886572 systemd[1]: Stopped systemd-modules-load.service. May 10 01:15:21.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.892831 systemd[1]: Stopping systemd-udevd.service... May 10 01:15:21.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.902000 audit: BPF prog-id=6 op=UNLOAD May 10 01:15:21.895479 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 10 01:15:21.896805 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 01:15:21.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.896999 systemd[1]: Stopped systemd-resolved.service. May 10 01:15:21.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.900999 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 01:15:21.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.901189 systemd[1]: Stopped systemd-udevd.service. May 10 01:15:21.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.903616 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 01:15:21.903683 systemd[1]: Closed systemd-udevd-control.socket. May 10 01:15:21.904388 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 01:15:21.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.904443 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 01:15:21.905636 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 01:15:21.905706 systemd[1]: Stopped dracut-pre-udev.service. May 10 01:15:21.907320 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 01:15:21.907384 systemd[1]: Stopped dracut-cmdline.service. May 10 01:15:21.908677 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 01:15:21.908738 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 01:15:21.912353 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 01:15:21.916925 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 01:15:21.917014 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 01:15:21.918305 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 01:15:21.918487 systemd[1]: Stopped network-cleanup.service. May 10 01:15:21.921181 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 01:15:21.921312 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 01:15:21.993460 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 01:15:21.993632 systemd[1]: Stopped sysroot-boot.service. May 10 01:15:21.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.995318 systemd[1]: Reached target initrd-switch-root.target. May 10 01:15:21.996366 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 01:15:21.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:21.996443 systemd[1]: Stopped initrd-setup-root.service. May 10 01:15:21.998850 systemd[1]: Starting initrd-switch-root.service... May 10 01:15:22.015491 systemd[1]: Switching root. May 10 01:15:22.033929 systemd-journald[202]: Journal stopped May 10 01:15:26.114187 systemd-journald[202]: Received SIGTERM from PID 1 (systemd). May 10 01:15:26.114442 kernel: SELinux: Class mctp_socket not defined in policy. May 10 01:15:26.114492 kernel: SELinux: Class anon_inode not defined in policy. May 10 01:15:26.114520 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 01:15:26.114548 kernel: SELinux: policy capability network_peer_controls=1 May 10 01:15:26.114580 kernel: SELinux: policy capability open_perms=1 May 10 01:15:26.114606 kernel: SELinux: policy capability extended_socket_class=1 May 10 01:15:26.114640 kernel: SELinux: policy capability always_check_network=0 May 10 01:15:26.114666 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 01:15:26.114694 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 01:15:26.114743 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 01:15:26.114771 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 01:15:26.114798 systemd[1]: Successfully loaded SELinux policy in 61.158ms. May 10 01:15:26.114940 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 16.031ms. May 10 01:15:26.115002 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 01:15:26.115034 systemd[1]: Detected virtualization kvm. May 10 01:15:26.115064 systemd[1]: Detected architecture x86-64. May 10 01:15:26.115101 systemd[1]: Detected first boot. May 10 01:15:26.115125 systemd[1]: Hostname set to . May 10 01:15:26.115160 systemd[1]: Initializing machine ID from VM UUID. May 10 01:15:26.115183 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 01:15:26.115211 systemd[1]: Populated /etc with preset unit settings. May 10 01:15:26.115248 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 01:15:26.115283 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 01:15:26.115316 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 01:15:26.115346 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 10 01:15:26.115369 systemd[1]: Stopped initrd-switch-root.service. May 10 01:15:26.115396 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 10 01:15:26.115424 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 01:15:26.115458 systemd[1]: Created slice system-addon\x2drun.slice. May 10 01:15:26.115503 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 10 01:15:26.115526 systemd[1]: Created slice system-getty.slice. May 10 01:15:26.115547 systemd[1]: Created slice system-modprobe.slice. May 10 01:15:26.115568 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 01:15:26.115596 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 01:15:26.115626 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 01:15:26.115649 systemd[1]: Created slice user.slice. May 10 01:15:26.115685 systemd[1]: Started systemd-ask-password-console.path. May 10 01:15:26.115725 systemd[1]: Started systemd-ask-password-wall.path. May 10 01:15:26.115750 systemd[1]: Set up automount boot.automount. May 10 01:15:26.115780 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 01:15:26.115808 systemd[1]: Stopped target initrd-switch-root.target. May 10 01:15:26.115854 systemd[1]: Stopped target initrd-fs.target. May 10 01:15:26.115895 systemd[1]: Stopped target initrd-root-fs.target. May 10 01:15:26.116442 systemd[1]: Reached target integritysetup.target. May 10 01:15:26.116470 systemd[1]: Reached target remote-cryptsetup.target. May 10 01:15:26.116502 systemd[1]: Reached target remote-fs.target. May 10 01:15:26.116531 systemd[1]: Reached target slices.target. May 10 01:15:26.116554 systemd[1]: Reached target swap.target. May 10 01:15:26.116581 systemd[1]: Reached target torcx.target. May 10 01:15:26.116603 systemd[1]: Reached target veritysetup.target. May 10 01:15:26.116630 systemd[1]: Listening on systemd-coredump.socket. May 10 01:15:26.116658 systemd[1]: Listening on systemd-initctl.socket. May 10 01:15:26.116693 systemd[1]: Listening on systemd-networkd.socket. May 10 01:15:26.116735 systemd[1]: Listening on systemd-udevd-control.socket. May 10 01:15:26.116766 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 01:15:26.116789 systemd[1]: Listening on systemd-userdbd.socket. May 10 01:15:26.116810 systemd[1]: Mounting dev-hugepages.mount... May 10 01:15:26.116832 systemd[1]: Mounting dev-mqueue.mount... May 10 01:15:26.116853 systemd[1]: Mounting media.mount... May 10 01:15:26.116895 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 01:15:26.116917 systemd[1]: Mounting sys-kernel-debug.mount... May 10 01:15:26.116946 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 01:15:26.116988 systemd[1]: Mounting tmp.mount... May 10 01:15:26.117011 systemd[1]: Starting flatcar-tmpfiles.service... May 10 01:15:26.117032 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 01:15:26.117053 systemd[1]: Starting kmod-static-nodes.service... May 10 01:15:26.117074 systemd[1]: Starting modprobe@configfs.service... May 10 01:15:26.117095 systemd[1]: Starting modprobe@dm_mod.service... May 10 01:15:26.117123 systemd[1]: Starting modprobe@drm.service... May 10 01:15:26.117146 systemd[1]: Starting modprobe@efi_pstore.service... May 10 01:15:26.117173 systemd[1]: Starting modprobe@fuse.service... May 10 01:15:26.117211 systemd[1]: Starting modprobe@loop.service... May 10 01:15:26.117235 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 01:15:26.117257 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 10 01:15:26.117285 systemd[1]: Stopped systemd-fsck-root.service. May 10 01:15:26.117307 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 10 01:15:26.117328 systemd[1]: Stopped systemd-fsck-usr.service. May 10 01:15:26.117350 systemd[1]: Stopped systemd-journald.service. May 10 01:15:26.117377 systemd[1]: Starting systemd-journald.service... May 10 01:15:26.117414 kernel: loop: module loaded May 10 01:15:26.117435 kernel: fuse: init (API version 7.34) May 10 01:15:26.117463 systemd[1]: Starting systemd-modules-load.service... May 10 01:15:26.117485 systemd[1]: Starting systemd-network-generator.service... May 10 01:15:26.117506 systemd[1]: Starting systemd-remount-fs.service... May 10 01:15:26.117533 systemd[1]: Starting systemd-udev-trigger.service... May 10 01:15:26.117562 systemd[1]: verity-setup.service: Deactivated successfully. May 10 01:15:26.117584 systemd[1]: Stopped verity-setup.service. May 10 01:15:26.117605 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 01:15:26.117626 systemd[1]: Mounted dev-hugepages.mount. May 10 01:15:26.117660 systemd[1]: Mounted dev-mqueue.mount. May 10 01:15:26.117683 systemd[1]: Mounted media.mount. May 10 01:15:26.117713 systemd[1]: Mounted sys-kernel-debug.mount. May 10 01:15:26.117736 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 01:15:26.117757 systemd[1]: Mounted tmp.mount. May 10 01:15:26.117778 systemd[1]: Finished kmod-static-nodes.service. May 10 01:15:26.117800 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 01:15:26.117821 systemd[1]: Finished modprobe@configfs.service. May 10 01:15:26.117842 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 01:15:26.117912 systemd[1]: Finished modprobe@dm_mod.service. May 10 01:15:26.117955 systemd-journald[974]: Journal started May 10 01:15:26.118079 systemd-journald[974]: Runtime Journal (/run/log/journal/e2e58a0ca6cd4f45a170aec54b5690a7) is 4.7M, max 38.1M, 33.3M free. May 10 01:15:22.208000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 01:15:22.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 01:15:22.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 01:15:22.290000 audit: BPF prog-id=10 op=LOAD May 10 01:15:22.290000 audit: BPF prog-id=10 op=UNLOAD May 10 01:15:22.290000 audit: BPF prog-id=11 op=LOAD May 10 01:15:22.290000 audit: BPF prog-id=11 op=UNLOAD May 10 01:15:22.429000 audit[900]: AVC avc: denied { associate } for pid=900 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 01:15:22.429000 audit[900]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001078c2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=883 pid=900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:22.429000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 01:15:22.432000 audit[900]: AVC avc: denied { associate } for pid=900 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 10 01:15:22.432000 audit[900]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000107999 a2=1ed a3=0 items=2 ppid=883 pid=900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:22.432000 audit: CWD cwd="/" May 10 01:15:22.432000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:22.432000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:22.432000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 01:15:25.831000 audit: BPF prog-id=12 op=LOAD May 10 01:15:25.831000 audit: BPF prog-id=3 op=UNLOAD May 10 01:15:25.831000 audit: BPF prog-id=13 op=LOAD May 10 01:15:25.831000 audit: BPF prog-id=14 op=LOAD May 10 01:15:25.832000 audit: BPF prog-id=4 op=UNLOAD May 10 01:15:25.832000 audit: BPF prog-id=5 op=UNLOAD May 10 01:15:25.834000 audit: BPF prog-id=15 op=LOAD May 10 01:15:25.834000 audit: BPF prog-id=12 op=UNLOAD May 10 01:15:25.834000 audit: BPF prog-id=16 op=LOAD May 10 01:15:25.834000 audit: BPF prog-id=17 op=LOAD May 10 01:15:25.834000 audit: BPF prog-id=13 op=UNLOAD May 10 01:15:25.834000 audit: BPF prog-id=14 op=UNLOAD May 10 01:15:25.835000 audit: BPF prog-id=18 op=LOAD May 10 01:15:25.835000 audit: BPF prog-id=15 op=UNLOAD May 10 01:15:25.835000 audit: BPF prog-id=19 op=LOAD May 10 01:15:25.835000 audit: BPF prog-id=20 op=LOAD May 10 01:15:25.835000 audit: BPF prog-id=16 op=UNLOAD May 10 01:15:25.835000 audit: BPF prog-id=17 op=UNLOAD May 10 01:15:25.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:25.842000 audit: BPF prog-id=18 op=UNLOAD May 10 01:15:25.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:25.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.021000 audit: BPF prog-id=21 op=LOAD May 10 01:15:26.023000 audit: BPF prog-id=22 op=LOAD May 10 01:15:26.023000 audit: BPF prog-id=23 op=LOAD May 10 01:15:26.023000 audit: BPF prog-id=19 op=UNLOAD May 10 01:15:26.023000 audit: BPF prog-id=20 op=UNLOAD May 10 01:15:26.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.106000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 01:15:26.120940 systemd[1]: Started systemd-journald.service. May 10 01:15:26.106000 audit[974]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffeff991240 a2=4000 a3=7ffeff9912dc items=0 ppid=1 pid=974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:26.106000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 01:15:26.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:25.829395 systemd[1]: Queued start job for default target multi-user.target. May 10 01:15:22.425576 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 01:15:26.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:25.829424 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 10 01:15:22.426226 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:22Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 01:15:25.837488 systemd[1]: systemd-journald.service: Deactivated successfully. May 10 01:15:22.426274 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:22Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 01:15:26.121070 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 01:15:22.426331 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:22Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 10 01:15:26.121264 systemd[1]: Finished modprobe@drm.service. May 10 01:15:22.426350 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:22Z" level=debug msg="skipped missing lower profile" missing profile=oem May 10 01:15:26.122273 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 01:15:22.426414 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:22Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 10 01:15:26.122453 systemd[1]: Finished modprobe@efi_pstore.service. May 10 01:15:22.426437 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:22Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 10 01:15:26.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:22.426833 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:22Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 10 01:15:22.426927 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:22Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 01:15:22.426953 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:22Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 01:15:22.428910 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:22Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 10 01:15:26.124846 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 01:15:22.428972 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:22Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 10 01:15:22.429005 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:22Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 10 01:15:22.429033 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:22Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 10 01:15:22.429066 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:22Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 10 01:15:22.429094 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:22Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 10 01:15:25.205589 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:25Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 01:15:25.206322 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:25Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 01:15:25.206576 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:25Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 01:15:25.207020 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:25Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 01:15:25.207146 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:25Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 10 01:15:25.207297 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-05-10T01:15:25Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 10 01:15:26.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.127122 systemd[1]: Finished modprobe@fuse.service. May 10 01:15:26.128677 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 01:15:26.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.129013 systemd[1]: Finished modprobe@loop.service. May 10 01:15:26.130954 systemd[1]: Finished systemd-modules-load.service. May 10 01:15:26.131985 systemd[1]: Finished systemd-network-generator.service. May 10 01:15:26.133351 systemd[1]: Finished systemd-remount-fs.service. May 10 01:15:26.136786 systemd[1]: Reached target network-pre.target. May 10 01:15:26.139514 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 01:15:26.145723 systemd[1]: Mounting sys-kernel-config.mount... May 10 01:15:26.146468 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 01:15:26.150009 systemd[1]: Starting systemd-hwdb-update.service... May 10 01:15:26.152416 systemd[1]: Starting systemd-journal-flush.service... May 10 01:15:26.153186 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 01:15:26.155086 systemd[1]: Starting systemd-random-seed.service... May 10 01:15:26.156060 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 01:15:26.160133 systemd[1]: Starting systemd-sysctl.service... May 10 01:15:26.163669 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 01:15:26.164514 systemd[1]: Mounted sys-kernel-config.mount. May 10 01:15:26.164792 systemd-journald[974]: Time spent on flushing to /var/log/journal/e2e58a0ca6cd4f45a170aec54b5690a7 is 70.213ms for 1293 entries. May 10 01:15:26.164792 systemd-journald[974]: System Journal (/var/log/journal/e2e58a0ca6cd4f45a170aec54b5690a7) is 8.0M, max 584.8M, 576.8M free. May 10 01:15:26.255653 systemd-journald[974]: Received client request to flush runtime journal. May 10 01:15:26.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.189268 systemd[1]: Finished flatcar-tmpfiles.service. May 10 01:15:26.192097 systemd[1]: Starting systemd-sysusers.service... May 10 01:15:26.196763 systemd[1]: Finished systemd-random-seed.service. May 10 01:15:26.197550 systemd[1]: Reached target first-boot-complete.target. May 10 01:15:26.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.229752 systemd[1]: Finished systemd-sysctl.service. May 10 01:15:26.246210 systemd[1]: Finished systemd-sysusers.service. May 10 01:15:26.256988 systemd[1]: Finished systemd-journal-flush.service. May 10 01:15:26.319308 systemd[1]: Finished systemd-udev-trigger.service. May 10 01:15:26.321976 systemd[1]: Starting systemd-udev-settle.service... May 10 01:15:26.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.335597 udevadm[1010]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 10 01:15:26.830067 systemd[1]: Finished systemd-hwdb-update.service. May 10 01:15:26.839000 kernel: kauditd_printk_skb: 106 callbacks suppressed May 10 01:15:26.839086 kernel: audit: type=1130 audit(1746839726.830:146): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.841043 kernel: audit: type=1334 audit(1746839726.832:147): prog-id=24 op=LOAD May 10 01:15:26.832000 audit: BPF prog-id=24 op=LOAD May 10 01:15:26.840183 systemd[1]: Starting systemd-udevd.service... May 10 01:15:26.838000 audit: BPF prog-id=25 op=LOAD May 10 01:15:26.838000 audit: BPF prog-id=7 op=UNLOAD May 10 01:15:26.838000 audit: BPF prog-id=8 op=UNLOAD May 10 01:15:26.843452 kernel: audit: type=1334 audit(1746839726.838:148): prog-id=25 op=LOAD May 10 01:15:26.843505 kernel: audit: type=1334 audit(1746839726.838:149): prog-id=7 op=UNLOAD May 10 01:15:26.843539 kernel: audit: type=1334 audit(1746839726.838:150): prog-id=8 op=UNLOAD May 10 01:15:26.871574 systemd-udevd[1011]: Using default interface naming scheme 'v252'. May 10 01:15:26.920885 systemd[1]: Started systemd-udevd.service. May 10 01:15:26.931904 kernel: audit: type=1130 audit(1746839726.920:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:26.938551 kernel: audit: type=1334 audit(1746839726.930:152): prog-id=26 op=LOAD May 10 01:15:26.930000 audit: BPF prog-id=26 op=LOAD May 10 01:15:26.934468 systemd[1]: Starting systemd-networkd.service... May 10 01:15:26.957774 kernel: audit: type=1334 audit(1746839726.948:153): prog-id=27 op=LOAD May 10 01:15:26.957902 kernel: audit: type=1334 audit(1746839726.949:154): prog-id=28 op=LOAD May 10 01:15:26.957946 kernel: audit: type=1334 audit(1746839726.949:155): prog-id=29 op=LOAD May 10 01:15:26.948000 audit: BPF prog-id=27 op=LOAD May 10 01:15:26.949000 audit: BPF prog-id=28 op=LOAD May 10 01:15:26.949000 audit: BPF prog-id=29 op=LOAD May 10 01:15:26.954724 systemd[1]: Starting systemd-userdbd.service... May 10 01:15:27.012454 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 10 01:15:27.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:27.024622 systemd[1]: Started systemd-userdbd.service. May 10 01:15:27.135960 kernel: mousedev: PS/2 mouse device common for all mice May 10 01:15:27.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:27.145497 systemd-networkd[1025]: lo: Link UP May 10 01:15:27.145511 systemd-networkd[1025]: lo: Gained carrier May 10 01:15:27.146456 systemd-networkd[1025]: Enumeration completed May 10 01:15:27.146608 systemd[1]: Started systemd-networkd.service. May 10 01:15:27.148607 systemd-networkd[1025]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 01:15:27.151212 systemd-networkd[1025]: eth0: Link UP May 10 01:15:27.151327 systemd-networkd[1025]: eth0: Gained carrier May 10 01:15:27.158896 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input4 May 10 01:15:27.169118 systemd-networkd[1025]: eth0: DHCPv4 address 10.244.17.126/30, gateway 10.244.17.125 acquired from 10.244.17.125 May 10 01:15:27.172907 kernel: ACPI: button: Power Button [PWRF] May 10 01:15:27.189291 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 01:15:27.213000 audit[1022]: AVC avc: denied { confidentiality } for pid=1022 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 01:15:27.213000 audit[1022]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55eed79c9180 a1=338ac a2=7f071db11bc5 a3=5 items=110 ppid=1011 pid=1022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:27.213000 audit: CWD cwd="/" May 10 01:15:27.213000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=1 name=(null) inode=15577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=2 name=(null) inode=15577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=3 name=(null) inode=15578 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=4 name=(null) inode=15577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=5 name=(null) inode=15579 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=6 name=(null) inode=15577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=7 name=(null) inode=15580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=8 name=(null) inode=15580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=9 name=(null) inode=15581 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=10 name=(null) inode=15580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=11 name=(null) inode=15582 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=12 name=(null) inode=15580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=13 name=(null) inode=15583 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=14 name=(null) inode=15580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=15 name=(null) inode=15584 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=16 name=(null) inode=15580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=17 name=(null) inode=15585 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=18 name=(null) inode=15577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=19 name=(null) inode=15586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=20 name=(null) inode=15586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=21 name=(null) inode=15587 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=22 name=(null) inode=15586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=23 name=(null) inode=15588 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=24 name=(null) inode=15586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=25 name=(null) inode=15589 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=26 name=(null) inode=15586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=27 name=(null) inode=15590 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=28 name=(null) inode=15586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=29 name=(null) inode=15591 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=30 name=(null) inode=15577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=31 name=(null) inode=15592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=32 name=(null) inode=15592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=33 name=(null) inode=15593 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=34 name=(null) inode=15592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=35 name=(null) inode=15594 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=36 name=(null) inode=15592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=37 name=(null) inode=15595 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=38 name=(null) inode=15592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=39 name=(null) inode=15596 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=40 name=(null) inode=15592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=41 name=(null) inode=15597 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=42 name=(null) inode=15577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=43 name=(null) inode=15598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=44 name=(null) inode=15598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=45 name=(null) inode=15599 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=46 name=(null) inode=15598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=47 name=(null) inode=15600 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=48 name=(null) inode=15598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=49 name=(null) inode=15601 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=50 name=(null) inode=15598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=51 name=(null) inode=15602 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=52 name=(null) inode=15598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=53 name=(null) inode=15603 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=55 name=(null) inode=15604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=56 name=(null) inode=15604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=57 name=(null) inode=15605 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=58 name=(null) inode=15604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=59 name=(null) inode=15606 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=60 name=(null) inode=15604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=61 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=62 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=63 name=(null) inode=15608 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=64 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=65 name=(null) inode=15609 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=66 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=67 name=(null) inode=15610 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=68 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=69 name=(null) inode=15611 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=70 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=71 name=(null) inode=15612 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=72 name=(null) inode=15604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=73 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=74 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=75 name=(null) inode=15614 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=76 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=77 name=(null) inode=15615 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=78 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=79 name=(null) inode=15616 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=80 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=81 name=(null) inode=15617 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=82 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=83 name=(null) inode=15618 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=84 name=(null) inode=15604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=85 name=(null) inode=15619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=86 name=(null) inode=15619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=87 name=(null) inode=15620 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=88 name=(null) inode=15619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=89 name=(null) inode=15621 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=90 name=(null) inode=15619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=91 name=(null) inode=15622 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=92 name=(null) inode=15619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=93 name=(null) inode=15623 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=94 name=(null) inode=15619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=95 name=(null) inode=15624 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=96 name=(null) inode=15604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=97 name=(null) inode=15625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=98 name=(null) inode=15625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=99 name=(null) inode=15626 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=100 name=(null) inode=15625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=101 name=(null) inode=15627 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=102 name=(null) inode=15625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=103 name=(null) inode=15628 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=104 name=(null) inode=15625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=105 name=(null) inode=15629 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=106 name=(null) inode=15625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=107 name=(null) inode=15630 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PATH item=109 name=(null) inode=15631 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:15:27.213000 audit: PROCTITLE proctitle="(udev-worker)" May 10 01:15:27.270356 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 10 01:15:27.308223 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input5 May 10 01:15:27.308270 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 10 01:15:27.308518 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 10 01:15:27.451672 systemd[1]: Finished systemd-udev-settle.service. May 10 01:15:27.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:27.454402 systemd[1]: Starting lvm2-activation-early.service... May 10 01:15:27.477459 lvm[1040]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 01:15:27.512458 systemd[1]: Finished lvm2-activation-early.service. May 10 01:15:27.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:27.513420 systemd[1]: Reached target cryptsetup.target. May 10 01:15:27.515951 systemd[1]: Starting lvm2-activation.service... May 10 01:15:27.521806 lvm[1041]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 01:15:27.548407 systemd[1]: Finished lvm2-activation.service. May 10 01:15:27.549350 systemd[1]: Reached target local-fs-pre.target. May 10 01:15:27.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:27.550026 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 01:15:27.550071 systemd[1]: Reached target local-fs.target. May 10 01:15:27.550690 systemd[1]: Reached target machines.target. May 10 01:15:27.553109 systemd[1]: Starting ldconfig.service... May 10 01:15:27.554414 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 01:15:27.554482 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 01:15:27.556457 systemd[1]: Starting systemd-boot-update.service... May 10 01:15:27.559280 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 01:15:27.565224 systemd[1]: Starting systemd-machine-id-commit.service... May 10 01:15:27.569348 systemd[1]: Starting systemd-sysext.service... May 10 01:15:27.571093 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1043 (bootctl) May 10 01:15:27.574345 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 01:15:27.581107 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 01:15:27.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:27.713978 systemd[1]: Unmounting usr-share-oem.mount... May 10 01:15:27.734844 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 10 01:15:27.735231 systemd[1]: Unmounted usr-share-oem.mount. May 10 01:15:27.738391 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 01:15:27.739365 systemd[1]: Finished systemd-machine-id-commit.service. May 10 01:15:27.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:27.760900 kernel: loop0: detected capacity change from 0 to 205544 May 10 01:15:27.796898 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 10 01:15:27.821290 systemd-fsck[1052]: fsck.fat 4.2 (2021-01-31) May 10 01:15:27.821290 systemd-fsck[1052]: /dev/vda1: 790 files, 120688/258078 clusters May 10 01:15:27.825924 kernel: loop1: detected capacity change from 0 to 205544 May 10 01:15:27.827569 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 01:15:27.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:27.830294 systemd[1]: Mounting boot.mount... May 10 01:15:27.844071 systemd[1]: Mounted boot.mount. May 10 01:15:27.862534 (sd-sysext)[1055]: Using extensions 'kubernetes'. May 10 01:15:27.864763 (sd-sysext)[1055]: Merged extensions into '/usr'. May 10 01:15:27.867055 systemd[1]: Finished systemd-boot-update.service. May 10 01:15:27.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:27.894534 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 01:15:27.897162 systemd[1]: Mounting usr-share-oem.mount... May 10 01:15:27.899200 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 01:15:27.901208 systemd[1]: Starting modprobe@dm_mod.service... May 10 01:15:27.904223 systemd[1]: Starting modprobe@efi_pstore.service... May 10 01:15:27.907615 systemd[1]: Starting modprobe@loop.service... May 10 01:15:27.908737 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 01:15:27.909023 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 01:15:27.909227 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 01:15:27.914616 systemd[1]: Mounted usr-share-oem.mount. May 10 01:15:27.915956 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 01:15:27.916178 systemd[1]: Finished modprobe@dm_mod.service. May 10 01:15:27.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:27.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:27.917822 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 01:15:27.918639 systemd[1]: Finished modprobe@efi_pstore.service. May 10 01:15:27.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:27.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:27.921693 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 01:15:27.922564 systemd[1]: Finished modprobe@loop.service. May 10 01:15:27.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:27.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:27.926855 systemd[1]: Finished systemd-sysext.service. May 10 01:15:27.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:27.933052 systemd[1]: Starting ensure-sysext.service... May 10 01:15:27.933711 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 01:15:27.933788 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 01:15:27.935264 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 01:15:27.949487 systemd[1]: Reloading. May 10 01:15:27.963904 systemd-tmpfiles[1063]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 01:15:27.981532 systemd-tmpfiles[1063]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 01:15:27.997961 systemd-tmpfiles[1063]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 01:15:28.092174 /usr/lib/systemd/system-generators/torcx-generator[1085]: time="2025-05-10T01:15:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 01:15:28.092228 /usr/lib/systemd/system-generators/torcx-generator[1085]: time="2025-05-10T01:15:28Z" level=info msg="torcx already run" May 10 01:15:28.206950 ldconfig[1042]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 01:15:28.219235 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 01:15:28.219267 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 01:15:28.247077 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 01:15:28.336000 audit: BPF prog-id=30 op=LOAD May 10 01:15:28.336000 audit: BPF prog-id=27 op=UNLOAD May 10 01:15:28.336000 audit: BPF prog-id=31 op=LOAD May 10 01:15:28.337000 audit: BPF prog-id=32 op=LOAD May 10 01:15:28.337000 audit: BPF prog-id=28 op=UNLOAD May 10 01:15:28.337000 audit: BPF prog-id=29 op=UNLOAD May 10 01:15:28.337000 audit: BPF prog-id=33 op=LOAD May 10 01:15:28.337000 audit: BPF prog-id=26 op=UNLOAD May 10 01:15:28.339000 audit: BPF prog-id=34 op=LOAD May 10 01:15:28.340000 audit: BPF prog-id=35 op=LOAD May 10 01:15:28.340000 audit: BPF prog-id=24 op=UNLOAD May 10 01:15:28.340000 audit: BPF prog-id=25 op=UNLOAD May 10 01:15:28.343000 audit: BPF prog-id=36 op=LOAD May 10 01:15:28.343000 audit: BPF prog-id=21 op=UNLOAD May 10 01:15:28.343000 audit: BPF prog-id=37 op=LOAD May 10 01:15:28.343000 audit: BPF prog-id=38 op=LOAD May 10 01:15:28.344000 audit: BPF prog-id=22 op=UNLOAD May 10 01:15:28.344000 audit: BPF prog-id=23 op=UNLOAD May 10 01:15:28.348365 systemd[1]: Finished ldconfig.service. May 10 01:15:28.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.350788 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 01:15:28.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.357263 systemd[1]: Starting audit-rules.service... May 10 01:15:28.359680 systemd[1]: Starting clean-ca-certificates.service... May 10 01:15:28.366000 audit: BPF prog-id=39 op=LOAD May 10 01:15:28.365441 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 01:15:28.369232 systemd[1]: Starting systemd-resolved.service... May 10 01:15:28.372000 audit: BPF prog-id=40 op=LOAD May 10 01:15:28.374639 systemd[1]: Starting systemd-timesyncd.service... May 10 01:15:28.378159 systemd[1]: Starting systemd-update-utmp.service... May 10 01:15:28.380418 systemd[1]: Finished clean-ca-certificates.service. May 10 01:15:28.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.385819 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 01:15:28.396000 audit[1136]: SYSTEM_BOOT pid=1136 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 01:15:28.390558 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 01:15:28.392523 systemd[1]: Starting modprobe@dm_mod.service... May 10 01:15:28.395946 systemd[1]: Starting modprobe@efi_pstore.service... May 10 01:15:28.399632 systemd[1]: Starting modprobe@loop.service... May 10 01:15:28.401603 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 01:15:28.401803 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 01:15:28.402007 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 01:15:28.403523 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 01:15:28.403741 systemd[1]: Finished modprobe@dm_mod.service. May 10 01:15:28.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.406455 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 01:15:28.406648 systemd[1]: Finished modprobe@efi_pstore.service. May 10 01:15:28.408113 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 01:15:28.408297 systemd[1]: Finished modprobe@loop.service. May 10 01:15:28.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.413948 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 01:15:28.414245 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 01:15:28.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.416113 systemd[1]: Finished systemd-update-utmp.service. May 10 01:15:28.421009 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 01:15:28.423350 systemd[1]: Starting modprobe@dm_mod.service... May 10 01:15:28.427461 systemd[1]: Starting modprobe@efi_pstore.service... May 10 01:15:28.431335 systemd[1]: Starting modprobe@loop.service... May 10 01:15:28.433040 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 01:15:28.433217 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 01:15:28.433375 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 01:15:28.434851 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 01:15:28.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.436149 systemd[1]: Finished modprobe@dm_mod.service. May 10 01:15:28.437436 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 01:15:28.437621 systemd[1]: Finished modprobe@efi_pstore.service. May 10 01:15:28.438880 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 01:15:28.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.440141 systemd[1]: Finished modprobe@loop.service. May 10 01:15:28.441430 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 01:15:28.441578 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 01:15:28.447844 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 01:15:28.450688 systemd[1]: Starting modprobe@dm_mod.service... May 10 01:15:28.454740 systemd[1]: Starting modprobe@drm.service... May 10 01:15:28.459108 systemd[1]: Starting modprobe@efi_pstore.service... May 10 01:15:28.462812 systemd[1]: Starting modprobe@loop.service... May 10 01:15:28.464689 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 01:15:28.464881 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 01:15:28.466881 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 01:15:28.468108 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 01:15:28.469954 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 01:15:28.470162 systemd[1]: Finished modprobe@dm_mod.service. May 10 01:15:28.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.472488 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 01:15:28.472704 systemd[1]: Finished modprobe@drm.service. May 10 01:15:28.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.474561 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 01:15:28.474819 systemd[1]: Finished modprobe@efi_pstore.service. May 10 01:15:28.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.476676 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 01:15:28.476892 systemd[1]: Finished modprobe@loop.service. May 10 01:15:28.478422 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 01:15:28.478573 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 01:15:28.480298 systemd[1]: Finished ensure-sysext.service. May 10 01:15:28.487082 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 01:15:28.493246 systemd[1]: Starting systemd-update-done.service... May 10 01:15:28.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:28.506692 systemd[1]: Finished systemd-update-done.service. May 10 01:15:28.545000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 01:15:28.545000 audit[1162]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcf00c74b0 a2=420 a3=0 items=0 ppid=1130 pid=1162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:28.545000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 01:15:28.547088 augenrules[1162]: No rules May 10 01:15:28.548491 systemd[1]: Finished audit-rules.service. May 10 01:15:28.550816 systemd[1]: Started systemd-timesyncd.service. May 10 01:15:28.551574 systemd[1]: Reached target time-set.target. May 10 01:15:28.562629 systemd-resolved[1134]: Positive Trust Anchors: May 10 01:15:28.562655 systemd-resolved[1134]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 01:15:28.562707 systemd-resolved[1134]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 01:15:28.571069 systemd-resolved[1134]: Using system hostname 'srv-2kvu9.gb1.brightbox.com'. May 10 01:15:28.573774 systemd[1]: Started systemd-resolved.service. May 10 01:15:28.574591 systemd[1]: Reached target network.target. May 10 01:15:28.575231 systemd[1]: Reached target nss-lookup.target. May 10 01:15:28.575898 systemd[1]: Reached target sysinit.target. May 10 01:15:28.576621 systemd[1]: Started motdgen.path. May 10 01:15:28.577257 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 01:15:28.578242 systemd[1]: Started logrotate.timer. May 10 01:15:28.578965 systemd[1]: Started mdadm.timer. May 10 01:15:28.579525 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 01:15:28.580212 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 01:15:28.580270 systemd[1]: Reached target paths.target. May 10 01:15:28.580873 systemd[1]: Reached target timers.target. May 10 01:15:28.581945 systemd[1]: Listening on dbus.socket. May 10 01:15:28.584433 systemd[1]: Starting docker.socket... May 10 01:15:28.589102 systemd[1]: Listening on sshd.socket. May 10 01:15:28.604137 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 01:15:28.604998 systemd[1]: Listening on docker.socket. May 10 01:15:28.605757 systemd[1]: Reached target sockets.target. May 10 01:15:28.606396 systemd[1]: Reached target basic.target. May 10 01:15:28.607071 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 01:15:28.607129 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 01:15:28.608986 systemd[1]: Starting containerd.service... May 10 01:15:28.611283 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 10 01:15:28.614269 systemd[1]: Starting dbus.service... May 10 01:15:28.617782 systemd[1]: Starting enable-oem-cloudinit.service... May 10 01:15:28.625103 systemd[1]: Starting extend-filesystems.service... May 10 01:15:28.626060 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 01:15:28.628855 systemd[1]: Starting motdgen.service... May 10 01:15:28.633486 systemd[1]: Starting prepare-helm.service... May 10 01:15:28.637087 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 01:15:28.641547 systemd[1]: Starting sshd-keygen.service... May 10 01:15:28.647794 systemd[1]: Starting systemd-logind.service... May 10 01:15:28.649067 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 01:15:28.649215 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 10 01:15:28.653051 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 10 01:15:28.655019 systemd[1]: Starting update-engine.service... May 10 01:15:28.661606 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 01:15:28.667131 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 01:15:28.668061 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 01:15:28.673496 jq[1187]: true May 10 01:15:28.693301 jq[1175]: false May 10 01:15:28.695576 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 01:15:28.695888 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 01:15:28.708528 extend-filesystems[1176]: Found loop1 May 10 01:15:28.711024 extend-filesystems[1176]: Found vda May 10 01:15:28.712020 extend-filesystems[1176]: Found vda1 May 10 01:15:28.712796 extend-filesystems[1176]: Found vda2 May 10 01:15:28.713577 extend-filesystems[1176]: Found vda3 May 10 01:15:28.714771 extend-filesystems[1176]: Found usr May 10 01:15:28.714771 extend-filesystems[1176]: Found vda4 May 10 01:15:28.714771 extend-filesystems[1176]: Found vda6 May 10 01:15:28.714771 extend-filesystems[1176]: Found vda7 May 10 01:15:28.714771 extend-filesystems[1176]: Found vda9 May 10 01:15:28.714771 extend-filesystems[1176]: Checking size of /dev/vda9 May 10 01:15:28.725720 tar[1190]: linux-amd64/helm May 10 01:15:28.735385 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 01:15:28.735441 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 01:15:28.742061 jq[1191]: true May 10 01:15:28.751069 systemd[1]: motdgen.service: Deactivated successfully. May 10 01:15:28.751328 systemd[1]: Finished motdgen.service. May 10 01:15:28.779564 dbus-daemon[1172]: [system] SELinux support is enabled May 10 01:15:28.779851 systemd[1]: Started dbus.service. May 10 01:15:28.783835 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 01:15:28.783932 systemd[1]: Reached target system-config.target. May 10 01:15:28.784645 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 01:15:28.784720 systemd[1]: Reached target user-config.target. May 10 01:15:28.785453 dbus-daemon[1172]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1025 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") May 10 01:15:28.787286 extend-filesystems[1176]: Resized partition /dev/vda9 May 10 01:15:28.789136 dbus-daemon[1172]: [system] Successfully activated service 'org.freedesktop.systemd1' May 10 01:15:28.795944 systemd[1]: Starting systemd-hostnamed.service... May 10 01:15:28.820568 extend-filesystems[1225]: resize2fs 1.46.5 (30-Dec-2021) May 10 01:15:28.836119 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks May 10 01:15:28.861831 update_engine[1186]: I0510 01:15:28.860776 1186 main.cc:92] Flatcar Update Engine starting May 10 01:15:28.884716 update_engine[1186]: I0510 01:15:28.867363 1186 update_check_scheduler.cc:74] Next update check in 8m43s May 10 01:15:28.867281 systemd[1]: Started update-engine.service. May 10 01:15:28.871351 systemd[1]: Started locksmithd.service. May 10 01:15:28.888639 env[1189]: time="2025-05-10T01:15:28.888207729Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 01:15:28.893787 bash[1222]: Updated "/home/core/.ssh/authorized_keys" May 10 01:15:28.894747 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 01:15:29.604187 systemd-resolved[1134]: Clock change detected. Flushing caches. May 10 01:15:29.604623 systemd-timesyncd[1135]: Contacted time server 176.58.115.34:123 (0.flatcar.pool.ntp.org). May 10 01:15:29.604831 systemd-timesyncd[1135]: Initial clock synchronization to Sat 2025-05-10 01:15:29.604086 UTC. May 10 01:15:29.620038 systemd-logind[1185]: Watching system buttons on /dev/input/event2 (Power Button) May 10 01:15:29.620089 systemd-logind[1185]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 01:15:29.626136 systemd-logind[1185]: New seat seat0. May 10 01:15:29.629445 systemd[1]: Started systemd-logind.service. May 10 01:15:29.683881 env[1189]: time="2025-05-10T01:15:29.683780306Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 01:15:29.684038 env[1189]: time="2025-05-10T01:15:29.684019028Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 01:15:29.690246 env[1189]: time="2025-05-10T01:15:29.690185805Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 01:15:29.690246 env[1189]: time="2025-05-10T01:15:29.690240094Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 01:15:29.690575 env[1189]: time="2025-05-10T01:15:29.690537191Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 01:15:29.690575 env[1189]: time="2025-05-10T01:15:29.690572442Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 01:15:29.690685 env[1189]: time="2025-05-10T01:15:29.690594575Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 01:15:29.690685 env[1189]: time="2025-05-10T01:15:29.690611690Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 01:15:29.690826 env[1189]: time="2025-05-10T01:15:29.690767401Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 01:15:29.691290 env[1189]: time="2025-05-10T01:15:29.691251659Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 01:15:29.691578 env[1189]: time="2025-05-10T01:15:29.691537123Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 01:15:29.691578 env[1189]: time="2025-05-10T01:15:29.691572100Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 01:15:29.691738 env[1189]: time="2025-05-10T01:15:29.691673353Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 01:15:29.691738 env[1189]: time="2025-05-10T01:15:29.691697868Z" level=info msg="metadata content store policy set" policy=shared May 10 01:15:29.716704 env[1189]: time="2025-05-10T01:15:29.716580300Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 01:15:29.716704 env[1189]: time="2025-05-10T01:15:29.716645506Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 01:15:29.716704 env[1189]: time="2025-05-10T01:15:29.716672484Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 01:15:29.717015 env[1189]: time="2025-05-10T01:15:29.716768413Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 01:15:29.717015 env[1189]: time="2025-05-10T01:15:29.716804557Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 01:15:29.717015 env[1189]: time="2025-05-10T01:15:29.716896971Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 01:15:29.717015 env[1189]: time="2025-05-10T01:15:29.716919470Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 01:15:29.717015 env[1189]: time="2025-05-10T01:15:29.716940906Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 01:15:29.717015 env[1189]: time="2025-05-10T01:15:29.716962494Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 01:15:29.717015 env[1189]: time="2025-05-10T01:15:29.716983601Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 01:15:29.717015 env[1189]: time="2025-05-10T01:15:29.717003260Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 01:15:29.717344 env[1189]: time="2025-05-10T01:15:29.717031528Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 01:15:29.717344 env[1189]: time="2025-05-10T01:15:29.717208959Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 01:15:29.717432 env[1189]: time="2025-05-10T01:15:29.717366891Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 01:15:29.717760 env[1189]: time="2025-05-10T01:15:29.717728863Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 01:15:29.717842 env[1189]: time="2025-05-10T01:15:29.717789213Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 01:15:29.717842 env[1189]: time="2025-05-10T01:15:29.717816402Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 01:15:29.717946 env[1189]: time="2025-05-10T01:15:29.717894937Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 01:15:29.717946 env[1189]: time="2025-05-10T01:15:29.717921492Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 01:15:29.718033 env[1189]: time="2025-05-10T01:15:29.717947306Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 01:15:29.718033 env[1189]: time="2025-05-10T01:15:29.717976640Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 01:15:29.718033 env[1189]: time="2025-05-10T01:15:29.717999961Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 01:15:29.718033 env[1189]: time="2025-05-10T01:15:29.718019463Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 01:15:29.718225 env[1189]: time="2025-05-10T01:15:29.718037784Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 01:15:29.718225 env[1189]: time="2025-05-10T01:15:29.718057461Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 01:15:29.718225 env[1189]: time="2025-05-10T01:15:29.718080012Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 01:15:29.718374 env[1189]: time="2025-05-10T01:15:29.718301597Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 01:15:29.718374 env[1189]: time="2025-05-10T01:15:29.718342018Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 01:15:29.718374 env[1189]: time="2025-05-10T01:15:29.718366978Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 01:15:29.718497 env[1189]: time="2025-05-10T01:15:29.718386816Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 01:15:29.718497 env[1189]: time="2025-05-10T01:15:29.718409974Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 01:15:29.718497 env[1189]: time="2025-05-10T01:15:29.718427546Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 01:15:29.718497 env[1189]: time="2025-05-10T01:15:29.718482631Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 01:15:29.718704 env[1189]: time="2025-05-10T01:15:29.718557960Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 01:15:29.723273 env[1189]: time="2025-05-10T01:15:29.718824910Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 01:15:29.723273 env[1189]: time="2025-05-10T01:15:29.722066433Z" level=info msg="Connect containerd service" May 10 01:15:29.723273 env[1189]: time="2025-05-10T01:15:29.722139401Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 01:15:29.723273 env[1189]: time="2025-05-10T01:15:29.723131708Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 01:15:29.726302 env[1189]: time="2025-05-10T01:15:29.723635400Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 01:15:29.726302 env[1189]: time="2025-05-10T01:15:29.723744934Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 01:15:29.726302 env[1189]: time="2025-05-10T01:15:29.724931816Z" level=info msg="containerd successfully booted in 0.183063s" May 10 01:15:29.723927 systemd[1]: Started containerd.service. May 10 01:15:29.730602 env[1189]: time="2025-05-10T01:15:29.730533856Z" level=info msg="Start subscribing containerd event" May 10 01:15:29.730691 env[1189]: time="2025-05-10T01:15:29.730670214Z" level=info msg="Start recovering state" May 10 01:15:29.730870 env[1189]: time="2025-05-10T01:15:29.730839299Z" level=info msg="Start event monitor" May 10 01:15:29.730938 env[1189]: time="2025-05-10T01:15:29.730886939Z" level=info msg="Start snapshots syncer" May 10 01:15:29.730938 env[1189]: time="2025-05-10T01:15:29.730908052Z" level=info msg="Start cni network conf syncer for default" May 10 01:15:29.730938 env[1189]: time="2025-05-10T01:15:29.730926965Z" level=info msg="Start streaming server" May 10 01:15:29.743549 dbus-daemon[1172]: [system] Successfully activated service 'org.freedesktop.hostname1' May 10 01:15:29.743789 systemd[1]: Started systemd-hostnamed.service. May 10 01:15:29.744450 dbus-daemon[1172]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1226 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") May 10 01:15:29.750362 systemd[1]: Starting polkit.service... May 10 01:15:29.776112 polkitd[1233]: Started polkitd version 121 May 10 01:15:29.800288 systemd-networkd[1025]: eth0: Gained IPv6LL May 10 01:15:29.801912 systemd[1]: Created slice system-sshd.slice. May 10 01:15:29.819790 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 01:15:29.821119 systemd[1]: Reached target network-online.target. May 10 01:15:29.828634 systemd[1]: Starting kubelet.service... May 10 01:15:29.836081 polkitd[1233]: Loading rules from directory /etc/polkit-1/rules.d May 10 01:15:29.836233 polkitd[1233]: Loading rules from directory /usr/share/polkit-1/rules.d May 10 01:15:29.839876 polkitd[1233]: Finished loading, compiling and executing 2 rules May 10 01:15:29.840513 dbus-daemon[1172]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' May 10 01:15:29.840762 systemd[1]: Started polkit.service. May 10 01:15:29.841952 polkitd[1233]: Acquired the name org.freedesktop.PolicyKit1 on the system bus May 10 01:15:29.867795 systemd-hostnamed[1226]: Hostname set to (static) May 10 01:15:29.911881 kernel: EXT4-fs (vda9): resized filesystem to 15121403 May 10 01:15:29.937854 extend-filesystems[1225]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 10 01:15:29.937854 extend-filesystems[1225]: old_desc_blocks = 1, new_desc_blocks = 8 May 10 01:15:29.937854 extend-filesystems[1225]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. May 10 01:15:29.944630 extend-filesystems[1176]: Resized filesystem in /dev/vda9 May 10 01:15:29.940135 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 01:15:29.940407 systemd[1]: Finished extend-filesystems.service. May 10 01:15:30.295089 tar[1190]: linux-amd64/LICENSE May 10 01:15:30.295089 tar[1190]: linux-amd64/README.md May 10 01:15:30.301098 systemd[1]: Finished prepare-helm.service. May 10 01:15:30.439168 locksmithd[1229]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 01:15:31.032587 systemd[1]: Started kubelet.service. May 10 01:15:31.071339 sshd_keygen[1203]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 01:15:31.099087 systemd[1]: Finished sshd-keygen.service. May 10 01:15:31.102938 systemd[1]: Starting issuegen.service... May 10 01:15:31.106951 systemd[1]: Started sshd@0-10.244.17.126:22-139.178.68.195:39518.service. May 10 01:15:31.117564 systemd[1]: issuegen.service: Deactivated successfully. May 10 01:15:31.117828 systemd[1]: Finished issuegen.service. May 10 01:15:31.121876 systemd[1]: Starting systemd-user-sessions.service... May 10 01:15:31.135972 systemd[1]: Finished systemd-user-sessions.service. May 10 01:15:31.145396 systemd[1]: Started getty@tty1.service. May 10 01:15:31.150589 systemd[1]: Started serial-getty@ttyS0.service. May 10 01:15:31.152074 systemd[1]: Reached target getty.target. May 10 01:15:31.309852 systemd-networkd[1025]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:45f:24:19ff:fef4:117e/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:45f:24:19ff:fef4:117e/64 assigned by NDisc. May 10 01:15:31.309866 systemd-networkd[1025]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. May 10 01:15:31.748088 kubelet[1251]: E0510 01:15:31.747962 1251 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 01:15:31.750466 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 01:15:31.750746 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 01:15:31.751249 systemd[1]: kubelet.service: Consumed 1.077s CPU time. May 10 01:15:32.030901 sshd[1260]: Accepted publickey for core from 139.178.68.195 port 39518 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:15:32.034324 sshd[1260]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:15:32.051153 systemd[1]: Created slice user-500.slice. May 10 01:15:32.054733 systemd[1]: Starting user-runtime-dir@500.service... May 10 01:15:32.062763 systemd-logind[1185]: New session 1 of user core. May 10 01:15:32.073347 systemd[1]: Finished user-runtime-dir@500.service. May 10 01:15:32.077602 systemd[1]: Starting user@500.service... May 10 01:15:32.083270 (systemd)[1274]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 01:15:32.190206 systemd[1274]: Queued start job for default target default.target. May 10 01:15:32.191686 systemd[1274]: Reached target paths.target. May 10 01:15:32.191931 systemd[1274]: Reached target sockets.target. May 10 01:15:32.192118 systemd[1274]: Reached target timers.target. May 10 01:15:32.192289 systemd[1274]: Reached target basic.target. May 10 01:15:32.192501 systemd[1274]: Reached target default.target. May 10 01:15:32.192726 systemd[1274]: Startup finished in 100ms. May 10 01:15:32.193496 systemd[1]: Started user@500.service. May 10 01:15:32.198015 systemd[1]: Started session-1.scope. May 10 01:15:32.883355 systemd[1]: Started sshd@1-10.244.17.126:22-139.178.68.195:39532.service. May 10 01:15:33.773594 sshd[1284]: Accepted publickey for core from 139.178.68.195 port 39532 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:15:33.776684 sshd[1284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:15:33.790464 systemd[1]: Started session-2.scope. May 10 01:15:33.795682 systemd-logind[1185]: New session 2 of user core. May 10 01:15:34.399804 sshd[1284]: pam_unix(sshd:session): session closed for user core May 10 01:15:34.404810 systemd[1]: sshd@1-10.244.17.126:22-139.178.68.195:39532.service: Deactivated successfully. May 10 01:15:34.407194 systemd[1]: session-2.scope: Deactivated successfully. May 10 01:15:34.408217 systemd-logind[1185]: Session 2 logged out. Waiting for processes to exit. May 10 01:15:34.409329 systemd-logind[1185]: Removed session 2. May 10 01:15:34.550873 systemd[1]: Started sshd@2-10.244.17.126:22-139.178.68.195:39540.service. May 10 01:15:35.447525 sshd[1290]: Accepted publickey for core from 139.178.68.195 port 39540 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:15:35.449485 sshd[1290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:15:35.456559 systemd-logind[1185]: New session 3 of user core. May 10 01:15:35.458014 systemd[1]: Started session-3.scope. May 10 01:15:36.075843 sshd[1290]: pam_unix(sshd:session): session closed for user core May 10 01:15:36.079788 systemd-logind[1185]: Session 3 logged out. Waiting for processes to exit. May 10 01:15:36.080247 systemd[1]: sshd@2-10.244.17.126:22-139.178.68.195:39540.service: Deactivated successfully. May 10 01:15:36.081150 systemd[1]: session-3.scope: Deactivated successfully. May 10 01:15:36.082319 systemd-logind[1185]: Removed session 3. May 10 01:15:36.452338 coreos-metadata[1171]: May 10 01:15:36.451 WARN failed to locate config-drive, using the metadata service API instead May 10 01:15:36.507374 coreos-metadata[1171]: May 10 01:15:36.507 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 May 10 01:15:36.537256 coreos-metadata[1171]: May 10 01:15:36.537 INFO Fetch successful May 10 01:15:36.537462 coreos-metadata[1171]: May 10 01:15:36.537 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 May 10 01:15:36.577510 coreos-metadata[1171]: May 10 01:15:36.576 INFO Fetch successful May 10 01:15:36.579102 unknown[1171]: wrote ssh authorized keys file for user: core May 10 01:15:36.597147 update-ssh-keys[1297]: Updated "/home/core/.ssh/authorized_keys" May 10 01:15:36.597878 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 10 01:15:36.598571 systemd[1]: Reached target multi-user.target. May 10 01:15:36.601346 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 01:15:36.612722 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 01:15:36.613011 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 01:15:36.613663 systemd[1]: Startup finished in 1.128s (kernel) + 6.461s (initrd) + 13.784s (userspace) = 21.374s. May 10 01:15:42.002934 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 10 01:15:42.003290 systemd[1]: Stopped kubelet.service. May 10 01:15:42.003391 systemd[1]: kubelet.service: Consumed 1.077s CPU time. May 10 01:15:42.006023 systemd[1]: Starting kubelet.service... May 10 01:15:42.185345 systemd[1]: Started kubelet.service. May 10 01:15:42.263308 kubelet[1303]: E0510 01:15:42.263046 1303 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 01:15:42.267884 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 01:15:42.268126 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 01:15:46.222626 systemd[1]: Started sshd@3-10.244.17.126:22-139.178.68.195:38728.service. May 10 01:15:47.113437 sshd[1310]: Accepted publickey for core from 139.178.68.195 port 38728 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:15:47.115814 sshd[1310]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:15:47.123692 systemd-logind[1185]: New session 4 of user core. May 10 01:15:47.125187 systemd[1]: Started session-4.scope. May 10 01:15:47.736599 sshd[1310]: pam_unix(sshd:session): session closed for user core May 10 01:15:47.740503 systemd[1]: sshd@3-10.244.17.126:22-139.178.68.195:38728.service: Deactivated successfully. May 10 01:15:47.741726 systemd[1]: session-4.scope: Deactivated successfully. May 10 01:15:47.742553 systemd-logind[1185]: Session 4 logged out. Waiting for processes to exit. May 10 01:15:47.743863 systemd-logind[1185]: Removed session 4. May 10 01:15:47.886618 systemd[1]: Started sshd@4-10.244.17.126:22-139.178.68.195:38732.service. May 10 01:15:48.795949 sshd[1316]: Accepted publickey for core from 139.178.68.195 port 38732 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:15:48.797922 sshd[1316]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:15:48.805542 systemd-logind[1185]: New session 5 of user core. May 10 01:15:48.806314 systemd[1]: Started session-5.scope. May 10 01:15:49.771372 sshd[1316]: pam_unix(sshd:session): session closed for user core May 10 01:15:49.775081 systemd[1]: sshd@4-10.244.17.126:22-139.178.68.195:38732.service: Deactivated successfully. May 10 01:15:49.776109 systemd[1]: session-5.scope: Deactivated successfully. May 10 01:15:49.776992 systemd-logind[1185]: Session 5 logged out. Waiting for processes to exit. May 10 01:15:49.778632 systemd-logind[1185]: Removed session 5. May 10 01:15:49.920757 systemd[1]: Started sshd@5-10.244.17.126:22-139.178.68.195:38744.service. May 10 01:15:50.815329 sshd[1322]: Accepted publickey for core from 139.178.68.195 port 38744 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:15:50.818411 sshd[1322]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:15:50.826239 systemd[1]: Started session-6.scope. May 10 01:15:50.827106 systemd-logind[1185]: New session 6 of user core. May 10 01:15:51.444097 sshd[1322]: pam_unix(sshd:session): session closed for user core May 10 01:15:51.448666 systemd[1]: sshd@5-10.244.17.126:22-139.178.68.195:38744.service: Deactivated successfully. May 10 01:15:51.449798 systemd[1]: session-6.scope: Deactivated successfully. May 10 01:15:51.450623 systemd-logind[1185]: Session 6 logged out. Waiting for processes to exit. May 10 01:15:51.452139 systemd-logind[1185]: Removed session 6. May 10 01:15:51.591823 systemd[1]: Started sshd@6-10.244.17.126:22-139.178.68.195:38752.service. May 10 01:15:52.327626 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 10 01:15:52.328035 systemd[1]: Stopped kubelet.service. May 10 01:15:52.330408 systemd[1]: Starting kubelet.service... May 10 01:15:52.466654 systemd[1]: Started kubelet.service. May 10 01:15:52.489594 sshd[1328]: Accepted publickey for core from 139.178.68.195 port 38752 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:15:52.491472 sshd[1328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:15:52.500636 systemd[1]: Started session-7.scope. May 10 01:15:52.501255 systemd-logind[1185]: New session 7 of user core. May 10 01:15:52.542656 kubelet[1334]: E0510 01:15:52.542589 1334 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 01:15:52.545118 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 01:15:52.545383 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 01:15:52.979169 sudo[1340]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 01:15:52.980296 sudo[1340]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 01:15:52.991254 dbus-daemon[1172]: \xd0\xedƔ\xa3U: received setenforce notice (enforcing=521694480) May 10 01:15:52.996140 sudo[1340]: pam_unix(sudo:session): session closed for user root May 10 01:15:53.145444 sshd[1328]: pam_unix(sshd:session): session closed for user core May 10 01:15:53.152017 systemd-logind[1185]: Session 7 logged out. Waiting for processes to exit. May 10 01:15:53.152330 systemd[1]: sshd@6-10.244.17.126:22-139.178.68.195:38752.service: Deactivated successfully. May 10 01:15:53.154769 systemd[1]: session-7.scope: Deactivated successfully. May 10 01:15:53.156079 systemd-logind[1185]: Removed session 7. May 10 01:15:53.289392 systemd[1]: Started sshd@7-10.244.17.126:22-139.178.68.195:38764.service. May 10 01:15:54.193223 sshd[1344]: Accepted publickey for core from 139.178.68.195 port 38764 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:15:54.196388 sshd[1344]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:15:54.206104 systemd[1]: Started session-8.scope. May 10 01:15:54.206756 systemd-logind[1185]: New session 8 of user core. May 10 01:15:54.672911 sudo[1348]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 01:15:54.673313 sudo[1348]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 01:15:54.678259 sudo[1348]: pam_unix(sudo:session): session closed for user root May 10 01:15:54.685869 sudo[1347]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 01:15:54.686259 sudo[1347]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 01:15:54.702196 systemd[1]: Stopping audit-rules.service... May 10 01:15:54.703000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 01:15:54.716033 kernel: kauditd_printk_skb: 181 callbacks suppressed May 10 01:15:54.716246 kernel: audit: type=1305 audit(1746839754.703:222): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 01:15:54.716321 kernel: audit: type=1300 audit(1746839754.703:222): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff67136b30 a2=420 a3=0 items=0 ppid=1 pid=1351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:54.703000 audit[1351]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff67136b30 a2=420 a3=0 items=0 ppid=1 pid=1351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:54.720545 auditctl[1351]: No rules May 10 01:15:54.703000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 01:15:54.722693 systemd[1]: audit-rules.service: Deactivated successfully. May 10 01:15:54.724733 kernel: audit: type=1327 audit(1746839754.703:222): proctitle=2F7362696E2F617564697463746C002D44 May 10 01:15:54.723088 systemd[1]: Stopped audit-rules.service. May 10 01:15:54.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:54.730767 kernel: audit: type=1131 audit(1746839754.723:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:54.737227 systemd[1]: Starting audit-rules.service... May 10 01:15:54.776444 augenrules[1368]: No rules May 10 01:15:54.778039 systemd[1]: Finished audit-rules.service. May 10 01:15:54.784809 kernel: audit: type=1130 audit(1746839754.777:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:54.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:54.778000 audit[1347]: USER_END pid=1347 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 01:15:54.780114 sudo[1347]: pam_unix(sudo:session): session closed for user root May 10 01:15:54.778000 audit[1347]: CRED_DISP pid=1347 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 01:15:54.796892 kernel: audit: type=1106 audit(1746839754.778:225): pid=1347 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 01:15:54.797046 kernel: audit: type=1104 audit(1746839754.778:226): pid=1347 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 01:15:54.930000 audit[1344]: USER_END pid=1344 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:15:54.928832 sshd[1344]: pam_unix(sshd:session): session closed for user core May 10 01:15:54.934064 systemd[1]: sshd@7-10.244.17.126:22-139.178.68.195:38764.service: Deactivated successfully. May 10 01:15:54.935172 systemd[1]: session-8.scope: Deactivated successfully. May 10 01:15:54.936889 systemd-logind[1185]: Session 8 logged out. Waiting for processes to exit. May 10 01:15:54.939313 systemd-logind[1185]: Removed session 8. May 10 01:15:54.930000 audit[1344]: CRED_DISP pid=1344 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:15:54.946541 kernel: audit: type=1106 audit(1746839754.930:227): pid=1344 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:15:54.946819 kernel: audit: type=1104 audit(1746839754.930:228): pid=1344 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:15:54.947066 kernel: audit: type=1131 audit(1746839754.931:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.17.126:22-139.178.68.195:38764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:54.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.17.126:22-139.178.68.195:38764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:55.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.17.126:22-139.178.68.195:38772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:55.088750 systemd[1]: Started sshd@8-10.244.17.126:22-139.178.68.195:38772.service. May 10 01:15:55.986000 audit[1374]: USER_ACCT pid=1374 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:15:55.987627 sshd[1374]: Accepted publickey for core from 139.178.68.195 port 38772 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:15:55.988000 audit[1374]: CRED_ACQ pid=1374 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:15:55.988000 audit[1374]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd34509380 a2=3 a3=0 items=0 ppid=1 pid=1374 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:55.988000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:15:55.990542 sshd[1374]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:15:56.000405 systemd[1]: Started session-9.scope. May 10 01:15:56.000918 systemd-logind[1185]: New session 9 of user core. May 10 01:15:56.008000 audit[1374]: USER_START pid=1374 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:15:56.011000 audit[1376]: CRED_ACQ pid=1376 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:15:56.470000 audit[1377]: USER_ACCT pid=1377 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 01:15:56.470000 audit[1377]: CRED_REFR pid=1377 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 01:15:56.471373 sudo[1377]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 10 01:15:56.472293 sudo[1377]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 01:15:56.474000 audit[1377]: USER_START pid=1377 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 01:15:56.525673 systemd[1]: Starting docker.service... May 10 01:15:56.601058 env[1387]: time="2025-05-10T01:15:56.600946725Z" level=info msg="Starting up" May 10 01:15:56.604345 env[1387]: time="2025-05-10T01:15:56.604296206Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 01:15:56.604345 env[1387]: time="2025-05-10T01:15:56.604333695Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 01:15:56.604490 env[1387]: time="2025-05-10T01:15:56.604364929Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 01:15:56.604490 env[1387]: time="2025-05-10T01:15:56.604391804Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 01:15:56.614244 env[1387]: time="2025-05-10T01:15:56.614183618Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 01:15:56.614543 env[1387]: time="2025-05-10T01:15:56.614512941Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 01:15:56.614701 env[1387]: time="2025-05-10T01:15:56.614667701Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 01:15:56.614841 env[1387]: time="2025-05-10T01:15:56.614812663Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 01:15:56.625390 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3478023770-merged.mount: Deactivated successfully. May 10 01:15:56.658461 env[1387]: time="2025-05-10T01:15:56.657485836Z" level=info msg="Loading containers: start." May 10 01:15:56.767000 audit[1419]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:56.767000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd1cdfa260 a2=0 a3=7ffd1cdfa24c items=0 ppid=1387 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:56.767000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 10 01:15:56.772000 audit[1421]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:56.772000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffce18ee600 a2=0 a3=7ffce18ee5ec items=0 ppid=1387 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:56.772000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 10 01:15:56.775000 audit[1423]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:56.775000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcf7137670 a2=0 a3=7ffcf713765c items=0 ppid=1387 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:56.775000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 01:15:56.778000 audit[1425]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:56.778000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff279768c0 a2=0 a3=7fff279768ac items=0 ppid=1387 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:56.778000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 01:15:56.787000 audit[1427]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:56.787000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdfdd5e920 a2=0 a3=7ffdfdd5e90c items=0 ppid=1387 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:56.787000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 10 01:15:56.806000 audit[1432]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:56.806000 audit[1432]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff72d121d0 a2=0 a3=7fff72d121bc items=0 ppid=1387 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:56.806000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 10 01:15:56.816000 audit[1434]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:56.816000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffca073ea70 a2=0 a3=7ffca073ea5c items=0 ppid=1387 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:56.816000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 10 01:15:56.820000 audit[1436]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:56.820000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd03182500 a2=0 a3=7ffd031824ec items=0 ppid=1387 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:56.820000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 10 01:15:56.823000 audit[1438]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:56.823000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd03eb7510 a2=0 a3=7ffd03eb74fc items=0 ppid=1387 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:56.823000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 01:15:56.835000 audit[1442]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:56.835000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc2b8fe6b0 a2=0 a3=7ffc2b8fe69c items=0 ppid=1387 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:56.835000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 01:15:56.841000 audit[1443]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:56.841000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc0a96df90 a2=0 a3=7ffc0a96df7c items=0 ppid=1387 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:56.841000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 01:15:56.855761 kernel: Initializing XFRM netlink socket May 10 01:15:56.903244 env[1387]: time="2025-05-10T01:15:56.903183300Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 10 01:15:56.954000 audit[1451]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:56.954000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffa5e9d450 a2=0 a3=7fffa5e9d43c items=0 ppid=1387 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:56.954000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 10 01:15:56.968000 audit[1454]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:56.968000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe928a3f20 a2=0 a3=7ffe928a3f0c items=0 ppid=1387 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:56.968000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 10 01:15:56.973000 audit[1457]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:56.973000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffeb9687b70 a2=0 a3=7ffeb9687b5c items=0 ppid=1387 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:56.973000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 10 01:15:56.977000 audit[1459]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:56.977000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc64954600 a2=0 a3=7ffc649545ec items=0 ppid=1387 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:56.977000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 10 01:15:56.980000 audit[1461]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:56.980000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe3ccfb9e0 a2=0 a3=7ffe3ccfb9cc items=0 ppid=1387 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:56.980000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 10 01:15:56.984000 audit[1463]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:56.984000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe878d90e0 a2=0 a3=7ffe878d90cc items=0 ppid=1387 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:56.984000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 10 01:15:56.987000 audit[1465]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:56.987000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff1e897040 a2=0 a3=7fff1e89702c items=0 ppid=1387 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:56.987000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 10 01:15:57.009000 audit[1468]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:57.009000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff7ad15940 a2=0 a3=7fff7ad1592c items=0 ppid=1387 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:57.009000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 10 01:15:57.012000 audit[1470]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:57.012000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff1448d5c0 a2=0 a3=7fff1448d5ac items=0 ppid=1387 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:57.012000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 01:15:57.016000 audit[1472]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:57.016000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffce9cbf220 a2=0 a3=7ffce9cbf20c items=0 ppid=1387 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:57.016000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 01:15:57.019000 audit[1474]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:57.019000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffa5279260 a2=0 a3=7fffa527924c items=0 ppid=1387 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:57.019000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 10 01:15:57.024401 systemd-networkd[1025]: docker0: Link UP May 10 01:15:57.036000 audit[1479]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:57.036000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffe8474eb0 a2=0 a3=7fffe8474e9c items=0 ppid=1387 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:57.036000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 01:15:57.041000 audit[1480]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:15:57.041000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcb19d6650 a2=0 a3=7ffcb19d663c items=0 ppid=1387 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:15:57.041000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 01:15:57.043196 env[1387]: time="2025-05-10T01:15:57.043135237Z" level=info msg="Loading containers: done." May 10 01:15:57.065170 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3309684527-merged.mount: Deactivated successfully. May 10 01:15:57.076731 env[1387]: time="2025-05-10T01:15:57.076588552Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 10 01:15:57.078116 env[1387]: time="2025-05-10T01:15:57.077244427Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 10 01:15:57.078116 env[1387]: time="2025-05-10T01:15:57.077528752Z" level=info msg="Daemon has completed initialization" May 10 01:15:57.098271 systemd[1]: Started docker.service. May 10 01:15:57.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:15:57.114279 env[1387]: time="2025-05-10T01:15:57.114101605Z" level=info msg="API listen on /run/docker.sock" May 10 01:15:58.531661 env[1189]: time="2025-05-10T01:15:58.531444355Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\"" May 10 01:15:59.293723 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount728965827.mount: Deactivated successfully. May 10 01:16:01.356842 systemd[1]: systemd-hostnamed.service: Deactivated successfully. May 10 01:16:01.367016 kernel: kauditd_printk_skb: 84 callbacks suppressed May 10 01:16:01.367156 kernel: audit: type=1131 audit(1746839761.356:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:01.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:01.392091 kernel: audit: type=1334 audit(1746839761.385:265): prog-id=46 op=UNLOAD May 10 01:16:01.392320 kernel: audit: type=1334 audit(1746839761.385:266): prog-id=45 op=UNLOAD May 10 01:16:01.392383 kernel: audit: type=1334 audit(1746839761.385:267): prog-id=44 op=UNLOAD May 10 01:16:01.385000 audit: BPF prog-id=46 op=UNLOAD May 10 01:16:01.385000 audit: BPF prog-id=45 op=UNLOAD May 10 01:16:01.385000 audit: BPF prog-id=44 op=UNLOAD May 10 01:16:02.728878 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 10 01:16:02.744134 kernel: audit: type=1130 audit(1746839762.727:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:02.744220 kernel: audit: type=1131 audit(1746839762.727:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:02.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:02.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:02.729305 systemd[1]: Stopped kubelet.service. May 10 01:16:02.735011 systemd[1]: Starting kubelet.service... May 10 01:16:02.906060 systemd[1]: Started kubelet.service. May 10 01:16:02.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:02.912870 kernel: audit: type=1130 audit(1746839762.904:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:02.964756 env[1189]: time="2025-05-10T01:16:02.963826075Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:02.967572 env[1189]: time="2025-05-10T01:16:02.966737362Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:02.970565 env[1189]: time="2025-05-10T01:16:02.970514390Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:02.972874 env[1189]: time="2025-05-10T01:16:02.972790967Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:30090db6a7d53799163ce82dae9e8ddb645fd47db93f2ec9da0cc787fd825625,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:02.974295 env[1189]: time="2025-05-10T01:16:02.974225936Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\" returns image reference \"sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc\"" May 10 01:16:02.978696 env[1189]: time="2025-05-10T01:16:02.978651968Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\"" May 10 01:16:02.989562 kubelet[1521]: E0510 01:16:02.988352 1521 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 01:16:02.991985 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 01:16:02.992232 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 01:16:02.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 01:16:02.998758 kernel: audit: type=1131 audit(1746839762.990:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 01:16:08.114961 env[1189]: time="2025-05-10T01:16:08.114698963Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:08.118488 env[1189]: time="2025-05-10T01:16:08.118406931Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:08.121514 env[1189]: time="2025-05-10T01:16:08.121471833Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:08.124240 env[1189]: time="2025-05-10T01:16:08.124198864Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:29eaddc64792a689df48506e78bbc641d063ac8bb92d2e66ae2ad05977420747,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:08.125772 env[1189]: time="2025-05-10T01:16:08.125684504Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\" returns image reference \"sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f\"" May 10 01:16:08.127624 env[1189]: time="2025-05-10T01:16:08.127579928Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\"" May 10 01:16:10.395999 env[1189]: time="2025-05-10T01:16:10.395913408Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:10.400786 env[1189]: time="2025-05-10T01:16:10.400700522Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:10.403779 env[1189]: time="2025-05-10T01:16:10.403744477Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:10.406792 env[1189]: time="2025-05-10T01:16:10.406748368Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:22994a2632e81059720480b9f6bdeb133b08d58492d0b36dfd6e9768b159b22a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:10.408218 env[1189]: time="2025-05-10T01:16:10.408167902Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\" returns image reference \"sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8\"" May 10 01:16:10.410185 env[1189]: time="2025-05-10T01:16:10.410137728Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 10 01:16:12.247685 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2287828434.mount: Deactivated successfully. May 10 01:16:13.253257 kernel: audit: type=1130 audit(1746839773.227:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:13.253843 kernel: audit: type=1131 audit(1746839773.227:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:13.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:13.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:13.228685 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 10 01:16:13.229058 systemd[1]: Stopped kubelet.service. May 10 01:16:13.259427 systemd[1]: Starting kubelet.service... May 10 01:16:13.589239 systemd[1]: Started kubelet.service. May 10 01:16:13.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:13.595741 kernel: audit: type=1130 audit(1746839773.588:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:13.621759 env[1189]: time="2025-05-10T01:16:13.621285511Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:13.624544 env[1189]: time="2025-05-10T01:16:13.624478253Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:13.626484 env[1189]: time="2025-05-10T01:16:13.626165511Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:13.633995 env[1189]: time="2025-05-10T01:16:13.633889677Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:13.635438 env[1189]: time="2025-05-10T01:16:13.634781151Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2\"" May 10 01:16:13.636090 env[1189]: time="2025-05-10T01:16:13.635815589Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 10 01:16:13.682652 kubelet[1530]: E0510 01:16:13.682556 1530 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 01:16:13.685283 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 01:16:13.685544 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 01:16:13.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 01:16:13.692745 kernel: audit: type=1131 audit(1746839773.684:275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 01:16:14.418278 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4243484.mount: Deactivated successfully. May 10 01:16:15.256963 update_engine[1186]: I0510 01:16:15.254112 1186 update_attempter.cc:509] Updating boot flags... May 10 01:16:16.490456 env[1189]: time="2025-05-10T01:16:16.490186221Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:16.497332 env[1189]: time="2025-05-10T01:16:16.495114917Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:16.501432 env[1189]: time="2025-05-10T01:16:16.499488424Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:16.506226 env[1189]: time="2025-05-10T01:16:16.506157270Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:16.507274 env[1189]: time="2025-05-10T01:16:16.507200311Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 10 01:16:16.510628 env[1189]: time="2025-05-10T01:16:16.510559690Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 10 01:16:17.155191 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3473550115.mount: Deactivated successfully. May 10 01:16:17.173126 env[1189]: time="2025-05-10T01:16:17.173040098Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:17.176994 env[1189]: time="2025-05-10T01:16:17.176925196Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:17.179402 env[1189]: time="2025-05-10T01:16:17.179360334Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:17.182563 env[1189]: time="2025-05-10T01:16:17.182519356Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:17.183881 env[1189]: time="2025-05-10T01:16:17.183830833Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 10 01:16:17.185635 env[1189]: time="2025-05-10T01:16:17.185559382Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 10 01:16:17.799198 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount432729062.mount: Deactivated successfully. May 10 01:16:21.658260 env[1189]: time="2025-05-10T01:16:21.657940318Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:21.662089 env[1189]: time="2025-05-10T01:16:21.662002958Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:21.665802 env[1189]: time="2025-05-10T01:16:21.665760437Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:21.668821 env[1189]: time="2025-05-10T01:16:21.668743984Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:21.670342 env[1189]: time="2025-05-10T01:16:21.670131220Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" May 10 01:16:23.728408 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. May 10 01:16:23.728923 systemd[1]: Stopped kubelet.service. May 10 01:16:23.738258 kernel: audit: type=1130 audit(1746839783.728:276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:23.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:23.746258 kernel: audit: type=1131 audit(1746839783.728:277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:23.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:23.744099 systemd[1]: Starting kubelet.service... May 10 01:16:24.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:24.089176 systemd[1]: Started kubelet.service. May 10 01:16:24.095751 kernel: audit: type=1130 audit(1746839784.089:278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:24.164762 kubelet[1570]: E0510 01:16:24.164654 1570 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 01:16:24.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 01:16:24.167302 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 01:16:24.167529 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 01:16:24.173801 kernel: audit: type=1131 audit(1746839784.167:279): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 01:16:28.172480 systemd[1]: Stopped kubelet.service. May 10 01:16:28.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:28.188859 kernel: audit: type=1130 audit(1746839788.172:280): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:28.189034 kernel: audit: type=1131 audit(1746839788.172:281): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:28.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:28.181197 systemd[1]: Starting kubelet.service... May 10 01:16:28.240122 systemd[1]: Reloading. May 10 01:16:28.392701 /usr/lib/systemd/system-generators/torcx-generator[1605]: time="2025-05-10T01:16:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 01:16:28.393787 /usr/lib/systemd/system-generators/torcx-generator[1605]: time="2025-05-10T01:16:28Z" level=info msg="torcx already run" May 10 01:16:28.525073 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 01:16:28.525115 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 01:16:28.553814 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 01:16:28.669948 kernel: audit: type=1400 audit(1746839788.659:282): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.670185 kernel: audit: type=1400 audit(1746839788.659:283): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.675495 kernel: audit: type=1400 audit(1746839788.659:284): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.680762 kernel: audit: type=1400 audit(1746839788.659:285): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.669000 audit: BPF prog-id=49 op=LOAD May 10 01:16:28.669000 audit: BPF prog-id=40 op=UNLOAD May 10 01:16:28.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.674000 audit: BPF prog-id=50 op=LOAD May 10 01:16:28.674000 audit: BPF prog-id=41 op=UNLOAD May 10 01:16:28.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.680000 audit: BPF prog-id=51 op=LOAD May 10 01:16:28.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.680000 audit: BPF prog-id=52 op=LOAD May 10 01:16:28.680000 audit: BPF prog-id=42 op=UNLOAD May 10 01:16:28.680000 audit: BPF prog-id=43 op=UNLOAD May 10 01:16:28.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.682000 audit: BPF prog-id=53 op=LOAD May 10 01:16:28.682000 audit: BPF prog-id=30 op=UNLOAD May 10 01:16:28.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.682000 audit: BPF prog-id=54 op=LOAD May 10 01:16:28.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.682000 audit: BPF prog-id=55 op=LOAD May 10 01:16:28.682000 audit: BPF prog-id=31 op=UNLOAD May 10 01:16:28.682000 audit: BPF prog-id=32 op=UNLOAD May 10 01:16:28.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.683000 audit: BPF prog-id=56 op=LOAD May 10 01:16:28.683000 audit: BPF prog-id=33 op=UNLOAD May 10 01:16:28.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.685000 audit: BPF prog-id=57 op=LOAD May 10 01:16:28.685000 audit: BPF prog-id=47 op=UNLOAD May 10 01:16:28.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.689000 audit: BPF prog-id=58 op=LOAD May 10 01:16:28.689000 audit: BPF prog-id=39 op=UNLOAD May 10 01:16:28.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.689000 audit: BPF prog-id=59 op=LOAD May 10 01:16:28.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.689000 audit: BPF prog-id=60 op=LOAD May 10 01:16:28.689000 audit: BPF prog-id=34 op=UNLOAD May 10 01:16:28.689000 audit: BPF prog-id=35 op=UNLOAD May 10 01:16:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit: BPF prog-id=61 op=LOAD May 10 01:16:28.694000 audit: BPF prog-id=36 op=UNLOAD May 10 01:16:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit: BPF prog-id=62 op=LOAD May 10 01:16:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:28.695000 audit: BPF prog-id=63 op=LOAD May 10 01:16:28.695000 audit: BPF prog-id=37 op=UNLOAD May 10 01:16:28.695000 audit: BPF prog-id=38 op=UNLOAD May 10 01:16:28.732428 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 10 01:16:28.732563 systemd[1]: kubelet.service: Failed with result 'signal'. May 10 01:16:28.740215 kernel: kauditd_printk_skb: 168 callbacks suppressed May 10 01:16:28.740370 kernel: audit: type=1130 audit(1746839788.732:454): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 01:16:28.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 01:16:28.732957 systemd[1]: Stopped kubelet.service. May 10 01:16:28.736157 systemd[1]: Starting kubelet.service... May 10 01:16:28.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:28.908123 systemd[1]: Started kubelet.service. May 10 01:16:28.915324 kernel: audit: type=1130 audit(1746839788.907:455): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:29.024917 kubelet[1655]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 01:16:29.024917 kubelet[1655]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 01:16:29.024917 kubelet[1655]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 01:16:29.025849 kubelet[1655]: I0510 01:16:29.025031 1655 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 01:16:29.512097 kubelet[1655]: I0510 01:16:29.511942 1655 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 10 01:16:29.512757 kubelet[1655]: I0510 01:16:29.512731 1655 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 01:16:29.514199 kubelet[1655]: I0510 01:16:29.514169 1655 server.go:929] "Client rotation is on, will bootstrap in background" May 10 01:16:29.564092 kubelet[1655]: I0510 01:16:29.564030 1655 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 01:16:29.564526 kubelet[1655]: E0510 01:16:29.564481 1655 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.244.17.126:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.244.17.126:6443: connect: connection refused" logger="UnhandledError" May 10 01:16:29.576655 kubelet[1655]: E0510 01:16:29.576589 1655 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 10 01:16:29.577009 kubelet[1655]: I0510 01:16:29.576983 1655 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 10 01:16:29.586099 kubelet[1655]: I0510 01:16:29.586047 1655 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 01:16:29.586535 kubelet[1655]: I0510 01:16:29.586508 1655 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 10 01:16:29.587054 kubelet[1655]: I0510 01:16:29.586991 1655 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 01:16:29.587506 kubelet[1655]: I0510 01:16:29.587182 1655 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-2kvu9.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 10 01:16:29.587894 kubelet[1655]: I0510 01:16:29.587866 1655 topology_manager.go:138] "Creating topology manager with none policy" May 10 01:16:29.588019 kubelet[1655]: I0510 01:16:29.587996 1655 container_manager_linux.go:300] "Creating device plugin manager" May 10 01:16:29.588373 kubelet[1655]: I0510 01:16:29.588349 1655 state_mem.go:36] "Initialized new in-memory state store" May 10 01:16:29.593316 kubelet[1655]: W0510 01:16:29.593220 1655 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.244.17.126:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-2kvu9.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.244.17.126:6443: connect: connection refused May 10 01:16:29.593654 kubelet[1655]: E0510 01:16:29.593601 1655 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.244.17.126:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-2kvu9.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.244.17.126:6443: connect: connection refused" logger="UnhandledError" May 10 01:16:29.597389 kubelet[1655]: I0510 01:16:29.597327 1655 kubelet.go:408] "Attempting to sync node with API server" May 10 01:16:29.597389 kubelet[1655]: I0510 01:16:29.597375 1655 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 01:16:29.597751 kubelet[1655]: I0510 01:16:29.597459 1655 kubelet.go:314] "Adding apiserver pod source" May 10 01:16:29.597751 kubelet[1655]: I0510 01:16:29.597504 1655 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 01:16:29.611617 kubelet[1655]: W0510 01:16:29.611444 1655 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.244.17.126:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.244.17.126:6443: connect: connection refused May 10 01:16:29.611617 kubelet[1655]: E0510 01:16:29.611536 1655 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.244.17.126:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.244.17.126:6443: connect: connection refused" logger="UnhandledError" May 10 01:16:29.613025 kubelet[1655]: I0510 01:16:29.612997 1655 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 01:16:29.615407 kubelet[1655]: I0510 01:16:29.615376 1655 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 01:16:29.616376 kubelet[1655]: W0510 01:16:29.616347 1655 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 10 01:16:29.617758 kubelet[1655]: I0510 01:16:29.617735 1655 server.go:1269] "Started kubelet" May 10 01:16:29.629424 kernel: audit: type=1400 audit(1746839789.620:456): avc: denied { mac_admin } for pid=1655 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:29.629690 kernel: audit: type=1401 audit(1746839789.620:456): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 01:16:29.620000 audit[1655]: AVC avc: denied { mac_admin } for pid=1655 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:29.620000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 01:16:29.630008 kubelet[1655]: E0510 01:16:29.626990 1655 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.244.17.126:6443/api/v1/namespaces/default/events\": dial tcp 10.244.17.126:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-2kvu9.gb1.brightbox.com.183e058893adfc7a default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-2kvu9.gb1.brightbox.com,UID:srv-2kvu9.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-2kvu9.gb1.brightbox.com,},FirstTimestamp:2025-05-10 01:16:29.617675386 +0000 UTC m=+0.694737615,LastTimestamp:2025-05-10 01:16:29.617675386 +0000 UTC m=+0.694737615,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-2kvu9.gb1.brightbox.com,}" May 10 01:16:29.630364 kubelet[1655]: I0510 01:16:29.630326 1655 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 01:16:29.630789 kubelet[1655]: I0510 01:16:29.630758 1655 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 01:16:29.631196 kubelet[1655]: I0510 01:16:29.631173 1655 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 01:16:29.620000 audit[1655]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000aeaff0 a1=c000ac51a0 a2=c000aeafc0 a3=25 items=0 ppid=1 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:29.639833 kernel: audit: type=1300 audit(1746839789.620:456): arch=c000003e syscall=188 success=no exit=-22 a0=c000aeaff0 a1=c000ac51a0 a2=c000aeafc0 a3=25 items=0 ppid=1 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:29.639916 kubelet[1655]: I0510 01:16:29.631889 1655 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 10 01:16:29.639916 kubelet[1655]: I0510 01:16:29.632049 1655 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 01:16:29.639916 kubelet[1655]: I0510 01:16:29.635279 1655 server.go:460] "Adding debug handlers to kubelet server" May 10 01:16:29.620000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 01:16:29.648324 kubelet[1655]: I0510 01:16:29.648159 1655 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 01:16:29.648742 kernel: audit: type=1327 audit(1746839789.620:456): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 01:16:29.650021 kubelet[1655]: E0510 01:16:29.649990 1655 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 01:16:29.650316 kubelet[1655]: I0510 01:16:29.650290 1655 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 01:16:29.629000 audit[1655]: AVC avc: denied { mac_admin } for pid=1655 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:29.656856 kernel: audit: type=1400 audit(1746839789.629:457): avc: denied { mac_admin } for pid=1655 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:29.660210 kubelet[1655]: I0510 01:16:29.660157 1655 volume_manager.go:289] "Starting Kubelet Volume Manager" May 10 01:16:29.661273 kubelet[1655]: E0510 01:16:29.661237 1655 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-2kvu9.gb1.brightbox.com\" not found" May 10 01:16:29.661894 kubelet[1655]: I0510 01:16:29.661861 1655 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 10 01:16:29.662022 kubelet[1655]: I0510 01:16:29.661999 1655 reconciler.go:26] "Reconciler: start to sync state" May 10 01:16:29.629000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 01:16:29.629000 audit[1655]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ac8b00 a1=c000ac51b8 a2=c000aeb080 a3=25 items=0 ppid=1 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:29.673239 kernel: audit: type=1401 audit(1746839789.629:457): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 01:16:29.673338 kernel: audit: type=1300 audit(1746839789.629:457): arch=c000003e syscall=188 success=no exit=-22 a0=c000ac8b00 a1=c000ac51b8 a2=c000aeb080 a3=25 items=0 ppid=1 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:29.674002 kubelet[1655]: I0510 01:16:29.673965 1655 factory.go:221] Registration of the systemd container factory successfully May 10 01:16:29.674187 kubelet[1655]: I0510 01:16:29.674137 1655 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 01:16:29.674651 kubelet[1655]: W0510 01:16:29.674511 1655 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.244.17.126:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.244.17.126:6443: connect: connection refused May 10 01:16:29.674776 kubelet[1655]: E0510 01:16:29.674671 1655 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.244.17.126:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.244.17.126:6443: connect: connection refused" logger="UnhandledError" May 10 01:16:29.629000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 01:16:29.684736 kernel: audit: type=1327 audit(1746839789.629:457): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 01:16:29.640000 audit[1665]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1665 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:29.640000 audit[1665]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdae64d520 a2=0 a3=7ffdae64d50c items=0 ppid=1655 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:29.640000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 01:16:29.640000 audit[1666]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1666 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:29.640000 audit[1666]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8b16a180 a2=0 a3=7fff8b16a16c items=0 ppid=1655 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:29.640000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 01:16:29.649000 audit[1668]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1668 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:29.649000 audit[1668]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe76c949f0 a2=0 a3=7ffe76c949dc items=0 ppid=1655 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:29.649000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 01:16:29.650000 audit[1670]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1670 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:29.650000 audit[1670]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcc7115390 a2=0 a3=7ffcc711537c items=0 ppid=1655 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:29.650000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 01:16:29.686081 kubelet[1655]: E0510 01:16:29.682757 1655 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.17.126:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-2kvu9.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.17.126:6443: connect: connection refused" interval="200ms" May 10 01:16:29.687886 kubelet[1655]: I0510 01:16:29.687850 1655 factory.go:221] Registration of the containerd container factory successfully May 10 01:16:29.699000 audit[1675]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1675 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:29.699000 audit[1675]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcfa237080 a2=0 a3=7ffcfa23706c items=0 ppid=1655 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:29.699000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 10 01:16:29.701083 kubelet[1655]: I0510 01:16:29.701011 1655 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 01:16:29.701000 audit[1678]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1678 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:29.701000 audit[1678]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc07acb270 a2=0 a3=7ffc07acb25c items=0 ppid=1655 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:29.701000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 01:16:29.702798 kubelet[1655]: I0510 01:16:29.702668 1655 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 01:16:29.702798 kubelet[1655]: I0510 01:16:29.702746 1655 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 01:16:29.702798 kubelet[1655]: I0510 01:16:29.702788 1655 kubelet.go:2321] "Starting kubelet main sync loop" May 10 01:16:29.702993 kubelet[1655]: E0510 01:16:29.702871 1655 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 01:16:29.703000 audit[1679]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1679 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:29.703000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6b7fb0c0 a2=0 a3=7ffe6b7fb0ac items=0 ppid=1655 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:29.703000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 01:16:29.705000 audit[1680]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1680 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:29.705000 audit[1680]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffde854d0 a2=0 a3=7ffffde854bc items=0 ppid=1655 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:29.705000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 01:16:29.708343 kubelet[1655]: W0510 01:16:29.708278 1655 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.244.17.126:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.244.17.126:6443: connect: connection refused May 10 01:16:29.708476 kubelet[1655]: E0510 01:16:29.708363 1655 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.244.17.126:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.244.17.126:6443: connect: connection refused" logger="UnhandledError" May 10 01:16:29.709000 audit[1681]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1681 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:29.709000 audit[1681]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca73969a0 a2=0 a3=7ffca739698c items=0 ppid=1655 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:29.709000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 01:16:29.710000 audit[1684]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1684 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:29.710000 audit[1684]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff6ee74780 a2=0 a3=7fff6ee7476c items=0 ppid=1655 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:29.710000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 01:16:29.712000 audit[1685]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1685 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:29.712000 audit[1685]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff2b626110 a2=0 a3=7fff2b6260fc items=0 ppid=1655 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:29.712000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 01:16:29.714000 audit[1686]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1686 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:29.714000 audit[1686]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd4de40ff0 a2=0 a3=7ffd4de40fdc items=0 ppid=1655 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:29.714000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 01:16:29.724777 kubelet[1655]: I0510 01:16:29.724736 1655 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 01:16:29.724777 kubelet[1655]: I0510 01:16:29.724766 1655 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 01:16:29.725114 kubelet[1655]: I0510 01:16:29.724807 1655 state_mem.go:36] "Initialized new in-memory state store" May 10 01:16:29.730002 kubelet[1655]: I0510 01:16:29.729940 1655 policy_none.go:49] "None policy: Start" May 10 01:16:29.733139 kubelet[1655]: I0510 01:16:29.733111 1655 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 01:16:29.733374 kubelet[1655]: I0510 01:16:29.733343 1655 state_mem.go:35] "Initializing new in-memory state store" May 10 01:16:29.745366 systemd[1]: Created slice kubepods.slice. May 10 01:16:29.752945 systemd[1]: Created slice kubepods-besteffort.slice. May 10 01:16:29.761465 systemd[1]: Created slice kubepods-burstable.slice. May 10 01:16:29.762239 kubelet[1655]: E0510 01:16:29.762127 1655 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-2kvu9.gb1.brightbox.com\" not found" May 10 01:16:29.767248 kubelet[1655]: I0510 01:16:29.767213 1655 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 01:16:29.766000 audit[1655]: AVC avc: denied { mac_admin } for pid=1655 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:29.766000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 01:16:29.766000 audit[1655]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000953ce0 a1=c000979e78 a2=c000953cb0 a3=25 items=0 ppid=1 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:29.766000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 01:16:29.769252 kubelet[1655]: I0510 01:16:29.768792 1655 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 01:16:29.769252 kubelet[1655]: I0510 01:16:29.769109 1655 eviction_manager.go:189] "Eviction manager: starting control loop" May 10 01:16:29.769252 kubelet[1655]: I0510 01:16:29.769155 1655 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 01:16:29.769936 kubelet[1655]: I0510 01:16:29.769892 1655 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 01:16:29.771693 kubelet[1655]: E0510 01:16:29.771664 1655 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"srv-2kvu9.gb1.brightbox.com\" not found" May 10 01:16:29.820686 systemd[1]: Created slice kubepods-burstable-pod7f7fd2af7f4a98406fc2673bc41d3fbd.slice. May 10 01:16:29.838485 systemd[1]: Created slice kubepods-burstable-podbac842beac1e806c0f85805243ae8155.slice. May 10 01:16:29.844557 systemd[1]: Created slice kubepods-burstable-pod55b554a4daa22224d93e0824a54c9698.slice. May 10 01:16:29.874411 kubelet[1655]: I0510 01:16:29.874303 1655 kubelet_node_status.go:72] "Attempting to register node" node="srv-2kvu9.gb1.brightbox.com" May 10 01:16:29.875206 kubelet[1655]: E0510 01:16:29.875168 1655 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.244.17.126:6443/api/v1/nodes\": dial tcp 10.244.17.126:6443: connect: connection refused" node="srv-2kvu9.gb1.brightbox.com" May 10 01:16:29.885830 kubelet[1655]: E0510 01:16:29.885738 1655 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.17.126:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-2kvu9.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.17.126:6443: connect: connection refused" interval="400ms" May 10 01:16:29.963231 kubelet[1655]: I0510 01:16:29.963130 1655 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/bac842beac1e806c0f85805243ae8155-ca-certs\") pod \"kube-controller-manager-srv-2kvu9.gb1.brightbox.com\" (UID: \"bac842beac1e806c0f85805243ae8155\") " pod="kube-system/kube-controller-manager-srv-2kvu9.gb1.brightbox.com" May 10 01:16:29.963702 kubelet[1655]: I0510 01:16:29.963613 1655 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/bac842beac1e806c0f85805243ae8155-k8s-certs\") pod \"kube-controller-manager-srv-2kvu9.gb1.brightbox.com\" (UID: \"bac842beac1e806c0f85805243ae8155\") " pod="kube-system/kube-controller-manager-srv-2kvu9.gb1.brightbox.com" May 10 01:16:29.963916 kubelet[1655]: I0510 01:16:29.963885 1655 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/bac842beac1e806c0f85805243ae8155-kubeconfig\") pod \"kube-controller-manager-srv-2kvu9.gb1.brightbox.com\" (UID: \"bac842beac1e806c0f85805243ae8155\") " pod="kube-system/kube-controller-manager-srv-2kvu9.gb1.brightbox.com" May 10 01:16:29.964089 kubelet[1655]: I0510 01:16:29.964057 1655 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/bac842beac1e806c0f85805243ae8155-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-2kvu9.gb1.brightbox.com\" (UID: \"bac842beac1e806c0f85805243ae8155\") " pod="kube-system/kube-controller-manager-srv-2kvu9.gb1.brightbox.com" May 10 01:16:29.964244 kubelet[1655]: I0510 01:16:29.964216 1655 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7f7fd2af7f4a98406fc2673bc41d3fbd-k8s-certs\") pod \"kube-apiserver-srv-2kvu9.gb1.brightbox.com\" (UID: \"7f7fd2af7f4a98406fc2673bc41d3fbd\") " pod="kube-system/kube-apiserver-srv-2kvu9.gb1.brightbox.com" May 10 01:16:29.964401 kubelet[1655]: I0510 01:16:29.964373 1655 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/bac842beac1e806c0f85805243ae8155-flexvolume-dir\") pod \"kube-controller-manager-srv-2kvu9.gb1.brightbox.com\" (UID: \"bac842beac1e806c0f85805243ae8155\") " pod="kube-system/kube-controller-manager-srv-2kvu9.gb1.brightbox.com" May 10 01:16:29.964576 kubelet[1655]: I0510 01:16:29.964534 1655 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/55b554a4daa22224d93e0824a54c9698-kubeconfig\") pod \"kube-scheduler-srv-2kvu9.gb1.brightbox.com\" (UID: \"55b554a4daa22224d93e0824a54c9698\") " pod="kube-system/kube-scheduler-srv-2kvu9.gb1.brightbox.com" May 10 01:16:29.964772 kubelet[1655]: I0510 01:16:29.964744 1655 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7f7fd2af7f4a98406fc2673bc41d3fbd-ca-certs\") pod \"kube-apiserver-srv-2kvu9.gb1.brightbox.com\" (UID: \"7f7fd2af7f4a98406fc2673bc41d3fbd\") " pod="kube-system/kube-apiserver-srv-2kvu9.gb1.brightbox.com" May 10 01:16:29.964929 kubelet[1655]: I0510 01:16:29.964902 1655 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7f7fd2af7f4a98406fc2673bc41d3fbd-usr-share-ca-certificates\") pod \"kube-apiserver-srv-2kvu9.gb1.brightbox.com\" (UID: \"7f7fd2af7f4a98406fc2673bc41d3fbd\") " pod="kube-system/kube-apiserver-srv-2kvu9.gb1.brightbox.com" May 10 01:16:30.079484 kubelet[1655]: I0510 01:16:30.079324 1655 kubelet_node_status.go:72] "Attempting to register node" node="srv-2kvu9.gb1.brightbox.com" May 10 01:16:30.081053 kubelet[1655]: E0510 01:16:30.081005 1655 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.244.17.126:6443/api/v1/nodes\": dial tcp 10.244.17.126:6443: connect: connection refused" node="srv-2kvu9.gb1.brightbox.com" May 10 01:16:30.139956 env[1189]: time="2025-05-10T01:16:30.139836605Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-2kvu9.gb1.brightbox.com,Uid:7f7fd2af7f4a98406fc2673bc41d3fbd,Namespace:kube-system,Attempt:0,}" May 10 01:16:30.145277 env[1189]: time="2025-05-10T01:16:30.144903296Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-2kvu9.gb1.brightbox.com,Uid:bac842beac1e806c0f85805243ae8155,Namespace:kube-system,Attempt:0,}" May 10 01:16:30.148834 env[1189]: time="2025-05-10T01:16:30.148493036Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-2kvu9.gb1.brightbox.com,Uid:55b554a4daa22224d93e0824a54c9698,Namespace:kube-system,Attempt:0,}" May 10 01:16:30.287802 kubelet[1655]: E0510 01:16:30.287666 1655 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.17.126:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-2kvu9.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.17.126:6443: connect: connection refused" interval="800ms" May 10 01:16:30.485258 kubelet[1655]: I0510 01:16:30.485217 1655 kubelet_node_status.go:72] "Attempting to register node" node="srv-2kvu9.gb1.brightbox.com" May 10 01:16:30.485728 kubelet[1655]: E0510 01:16:30.485680 1655 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.244.17.126:6443/api/v1/nodes\": dial tcp 10.244.17.126:6443: connect: connection refused" node="srv-2kvu9.gb1.brightbox.com" May 10 01:16:30.536992 kubelet[1655]: W0510 01:16:30.536912 1655 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.244.17.126:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.244.17.126:6443: connect: connection refused May 10 01:16:30.537437 kubelet[1655]: E0510 01:16:30.537373 1655 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.244.17.126:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.244.17.126:6443: connect: connection refused" logger="UnhandledError" May 10 01:16:30.694752 kubelet[1655]: W0510 01:16:30.694538 1655 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.244.17.126:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.244.17.126:6443: connect: connection refused May 10 01:16:30.694752 kubelet[1655]: E0510 01:16:30.694643 1655 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.244.17.126:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.244.17.126:6443: connect: connection refused" logger="UnhandledError" May 10 01:16:30.701657 kubelet[1655]: W0510 01:16:30.701499 1655 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.244.17.126:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.244.17.126:6443: connect: connection refused May 10 01:16:30.701657 kubelet[1655]: E0510 01:16:30.701604 1655 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.244.17.126:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.244.17.126:6443: connect: connection refused" logger="UnhandledError" May 10 01:16:30.773467 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3972464454.mount: Deactivated successfully. May 10 01:16:30.779409 env[1189]: time="2025-05-10T01:16:30.779349206Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:30.782225 env[1189]: time="2025-05-10T01:16:30.782185197Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:30.783217 env[1189]: time="2025-05-10T01:16:30.783170399Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:30.785179 env[1189]: time="2025-05-10T01:16:30.785138223Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:30.787254 env[1189]: time="2025-05-10T01:16:30.787215104Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:30.788689 env[1189]: time="2025-05-10T01:16:30.788652932Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:30.790341 env[1189]: time="2025-05-10T01:16:30.790303046Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:30.793447 env[1189]: time="2025-05-10T01:16:30.793397567Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:30.795405 env[1189]: time="2025-05-10T01:16:30.795322977Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:30.798335 env[1189]: time="2025-05-10T01:16:30.798277866Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:30.800993 env[1189]: time="2025-05-10T01:16:30.800948236Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:30.804319 env[1189]: time="2025-05-10T01:16:30.804272067Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:30.859246 env[1189]: time="2025-05-10T01:16:30.859103975Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:16:30.859246 env[1189]: time="2025-05-10T01:16:30.859195989Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:16:30.859700 env[1189]: time="2025-05-10T01:16:30.859218434Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:16:30.860185 env[1189]: time="2025-05-10T01:16:30.860108804Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3e196c516c90d8f1a6bfbc6eb2fc6527f6ccd6c13b6a2b9907ef6aac8d9271b1 pid=1702 runtime=io.containerd.runc.v2 May 10 01:16:30.867119 env[1189]: time="2025-05-10T01:16:30.867024184Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:16:30.867472 env[1189]: time="2025-05-10T01:16:30.867396323Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:16:30.867659 env[1189]: time="2025-05-10T01:16:30.867608495Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:16:30.868261 env[1189]: time="2025-05-10T01:16:30.868204245Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0b00774d382490dafc96364d9c1caf424e15888c87b282e88b282081774586d9 pid=1703 runtime=io.containerd.runc.v2 May 10 01:16:30.879033 env[1189]: time="2025-05-10T01:16:30.878906758Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:16:30.879256 env[1189]: time="2025-05-10T01:16:30.879073346Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:16:30.879256 env[1189]: time="2025-05-10T01:16:30.879145476Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:16:30.879466 env[1189]: time="2025-05-10T01:16:30.879411058Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/58d9f23ac137c6c23e27814f97b7c0df50adc9202736df47a1c7bdfb70e13f84 pid=1725 runtime=io.containerd.runc.v2 May 10 01:16:30.903278 systemd[1]: Started cri-containerd-0b00774d382490dafc96364d9c1caf424e15888c87b282e88b282081774586d9.scope. May 10 01:16:30.912790 kubelet[1655]: W0510 01:16:30.911633 1655 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.244.17.126:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-2kvu9.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.244.17.126:6443: connect: connection refused May 10 01:16:30.912790 kubelet[1655]: E0510 01:16:30.911770 1655 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.244.17.126:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-2kvu9.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.244.17.126:6443: connect: connection refused" logger="UnhandledError" May 10 01:16:30.928517 systemd[1]: Started cri-containerd-3e196c516c90d8f1a6bfbc6eb2fc6527f6ccd6c13b6a2b9907ef6aac8d9271b1.scope. May 10 01:16:30.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.948000 audit: BPF prog-id=64 op=LOAD May 10 01:16:30.950000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.950000 audit[1734]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1703 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:30.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062303037373464333832343930646166633936333634643963316361 May 10 01:16:30.950000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.950000 audit[1734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1703 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:30.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062303037373464333832343930646166633936333634643963316361 May 10 01:16:30.950000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.950000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.950000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.950000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.950000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.950000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.950000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.950000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.950000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.950000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.950000 audit: BPF prog-id=65 op=LOAD May 10 01:16:30.950000 audit[1734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025ce0 items=0 ppid=1703 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:30.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062303037373464333832343930646166633936333634643963316361 May 10 01:16:30.951000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.951000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.951000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.951000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.951000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.951000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.951000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.951000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.951000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.951000 audit: BPF prog-id=66 op=LOAD May 10 01:16:30.951000 audit[1734]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025d28 items=0 ppid=1703 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:30.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062303037373464333832343930646166633936333634643963316361 May 10 01:16:30.951000 audit: BPF prog-id=66 op=UNLOAD May 10 01:16:30.951000 audit: BPF prog-id=65 op=UNLOAD May 10 01:16:30.951000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.951000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.951000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.951000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.951000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.951000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.951000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.951000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.951000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.951000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.951000 audit: BPF prog-id=67 op=LOAD May 10 01:16:30.951000 audit[1734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000268138 items=0 ppid=1703 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:30.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062303037373464333832343930646166633936333634643963316361 May 10 01:16:30.969227 systemd[1]: Started cri-containerd-58d9f23ac137c6c23e27814f97b7c0df50adc9202736df47a1c7bdfb70e13f84.scope. May 10 01:16:30.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.983000 audit: BPF prog-id=68 op=LOAD May 10 01:16:30.986000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1702 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:30.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365313936633531366339306438663161366266626336656232666336 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1702 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:30.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365313936633531366339306438663161366266626336656232666336 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit: BPF prog-id=69 op=LOAD May 10 01:16:30.986000 audit[1729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000dbfb0 items=0 ppid=1702 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:30.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365313936633531366339306438663161366266626336656232666336 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit: BPF prog-id=70 op=LOAD May 10 01:16:30.986000 audit[1729]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000dbff8 items=0 ppid=1702 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:30.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365313936633531366339306438663161366266626336656232666336 May 10 01:16:30.986000 audit: BPF prog-id=70 op=UNLOAD May 10 01:16:30.986000 audit: BPF prog-id=69 op=UNLOAD May 10 01:16:30.986000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:30.986000 audit: BPF prog-id=71 op=LOAD May 10 01:16:30.986000 audit[1729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003da408 items=0 ppid=1702 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:30.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365313936633531366339306438663161366266626336656232666336 May 10 01:16:31.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.012000 audit: BPF prog-id=72 op=LOAD May 10 01:16:31.015000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.015000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1725 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:31.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538643966323361633133376336633233653237383134663937623763 May 10 01:16:31.015000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.015000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1725 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:31.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538643966323361633133376336633233653237383134663937623763 May 10 01:16:31.015000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.015000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.015000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.015000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.015000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.015000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.015000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.015000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.015000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.015000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.015000 audit: BPF prog-id=73 op=LOAD May 10 01:16:31.015000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dda20 items=0 ppid=1725 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:31.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538643966323361633133376336633233653237383134663937623763 May 10 01:16:31.015000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.015000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.015000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.015000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.015000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.015000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.015000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.015000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.015000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.015000 audit: BPF prog-id=74 op=LOAD May 10 01:16:31.015000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dda68 items=0 ppid=1725 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:31.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538643966323361633133376336633233653237383134663937623763 May 10 01:16:31.016000 audit: BPF prog-id=74 op=UNLOAD May 10 01:16:31.016000 audit: BPF prog-id=73 op=UNLOAD May 10 01:16:31.016000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.016000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.016000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.016000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.016000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.016000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.016000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.016000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.016000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.016000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.016000 audit: BPF prog-id=75 op=LOAD May 10 01:16:31.016000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001dde78 items=0 ppid=1725 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:31.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538643966323361633133376336633233653237383134663937623763 May 10 01:16:31.065209 env[1189]: time="2025-05-10T01:16:31.063176383Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-2kvu9.gb1.brightbox.com,Uid:bac842beac1e806c0f85805243ae8155,Namespace:kube-system,Attempt:0,} returns sandbox id \"0b00774d382490dafc96364d9c1caf424e15888c87b282e88b282081774586d9\"" May 10 01:16:31.074377 env[1189]: time="2025-05-10T01:16:31.074312107Z" level=info msg="CreateContainer within sandbox \"0b00774d382490dafc96364d9c1caf424e15888c87b282e88b282081774586d9\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 10 01:16:31.089601 kubelet[1655]: E0510 01:16:31.089462 1655 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.17.126:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-2kvu9.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.17.126:6443: connect: connection refused" interval="1.6s" May 10 01:16:31.102874 env[1189]: time="2025-05-10T01:16:31.102791774Z" level=info msg="CreateContainer within sandbox \"0b00774d382490dafc96364d9c1caf424e15888c87b282e88b282081774586d9\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"ba17886e2cdadc884a389043611f7a2c3bbc2a957c4bc7fb05e7ead1a2404003\"" May 10 01:16:31.103598 env[1189]: time="2025-05-10T01:16:31.103441765Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-2kvu9.gb1.brightbox.com,Uid:7f7fd2af7f4a98406fc2673bc41d3fbd,Namespace:kube-system,Attempt:0,} returns sandbox id \"58d9f23ac137c6c23e27814f97b7c0df50adc9202736df47a1c7bdfb70e13f84\"" May 10 01:16:31.106374 env[1189]: time="2025-05-10T01:16:31.106089830Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-2kvu9.gb1.brightbox.com,Uid:55b554a4daa22224d93e0824a54c9698,Namespace:kube-system,Attempt:0,} returns sandbox id \"3e196c516c90d8f1a6bfbc6eb2fc6527f6ccd6c13b6a2b9907ef6aac8d9271b1\"" May 10 01:16:31.106699 env[1189]: time="2025-05-10T01:16:31.106659241Z" level=info msg="StartContainer for \"ba17886e2cdadc884a389043611f7a2c3bbc2a957c4bc7fb05e7ead1a2404003\"" May 10 01:16:31.107641 env[1189]: time="2025-05-10T01:16:31.107597481Z" level=info msg="CreateContainer within sandbox \"58d9f23ac137c6c23e27814f97b7c0df50adc9202736df47a1c7bdfb70e13f84\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 10 01:16:31.122677 env[1189]: time="2025-05-10T01:16:31.122608437Z" level=info msg="CreateContainer within sandbox \"3e196c516c90d8f1a6bfbc6eb2fc6527f6ccd6c13b6a2b9907ef6aac8d9271b1\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 10 01:16:31.139236 systemd[1]: Started cri-containerd-ba17886e2cdadc884a389043611f7a2c3bbc2a957c4bc7fb05e7ead1a2404003.scope. May 10 01:16:31.150046 env[1189]: time="2025-05-10T01:16:31.149976246Z" level=info msg="CreateContainer within sandbox \"3e196c516c90d8f1a6bfbc6eb2fc6527f6ccd6c13b6a2b9907ef6aac8d9271b1\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"edb0ccb70ff8f1440474deb7b6a16ab04a99d6b3d2ebeac07e5ce0807da5d63b\"" May 10 01:16:31.150912 env[1189]: time="2025-05-10T01:16:31.150858817Z" level=info msg="CreateContainer within sandbox \"58d9f23ac137c6c23e27814f97b7c0df50adc9202736df47a1c7bdfb70e13f84\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"f3779c34b00f6c73eeafb165b02c51869c0e99c7030e1cb135f1f83d8ee927df\"" May 10 01:16:31.151825 env[1189]: time="2025-05-10T01:16:31.151789195Z" level=info msg="StartContainer for \"f3779c34b00f6c73eeafb165b02c51869c0e99c7030e1cb135f1f83d8ee927df\"" May 10 01:16:31.153747 env[1189]: time="2025-05-10T01:16:31.153681686Z" level=info msg="StartContainer for \"edb0ccb70ff8f1440474deb7b6a16ab04a99d6b3d2ebeac07e5ce0807da5d63b\"" May 10 01:16:31.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.177000 audit: BPF prog-id=76 op=LOAD May 10 01:16:31.178000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1703 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:31.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261313738383665326364616463383834613338393034333631316637 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1703 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:31.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261313738383665326364616463383834613338393034333631316637 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit: BPF prog-id=77 op=LOAD May 10 01:16:31.178000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003be9e0 items=0 ppid=1703 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:31.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261313738383665326364616463383834613338393034333631316637 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit: BPF prog-id=78 op=LOAD May 10 01:16:31.178000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003bea28 items=0 ppid=1703 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:31.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261313738383665326364616463383834613338393034333631316637 May 10 01:16:31.178000 audit: BPF prog-id=78 op=UNLOAD May 10 01:16:31.178000 audit: BPF prog-id=77 op=UNLOAD May 10 01:16:31.178000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.178000 audit: BPF prog-id=79 op=LOAD May 10 01:16:31.178000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003bee38 items=0 ppid=1703 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:31.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261313738383665326364616463383834613338393034333631316637 May 10 01:16:31.195341 systemd[1]: Started cri-containerd-edb0ccb70ff8f1440474deb7b6a16ab04a99d6b3d2ebeac07e5ce0807da5d63b.scope. May 10 01:16:31.234619 systemd[1]: Started cri-containerd-f3779c34b00f6c73eeafb165b02c51869c0e99c7030e1cb135f1f83d8ee927df.scope. May 10 01:16:31.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.247000 audit: BPF prog-id=80 op=LOAD May 10 01:16:31.248000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.248000 audit[1849]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1702 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:31.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564623063636237306666386631343430343734646562376236613136 May 10 01:16:31.251000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.251000 audit[1849]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1702 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:31.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564623063636237306666386631343430343734646562376236613136 May 10 01:16:31.253000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.253000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.253000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.253000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.253000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.253000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.253000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.253000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.253000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.253000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.253000 audit: BPF prog-id=81 op=LOAD May 10 01:16:31.253000 audit[1849]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000253a0 items=0 ppid=1702 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:31.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564623063636237306666386631343430343734646562376236613136 May 10 01:16:31.255000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.255000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.255000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.255000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.255000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.255000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.255000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.255000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.255000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.255000 audit: BPF prog-id=82 op=LOAD May 10 01:16:31.255000 audit[1849]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000253e8 items=0 ppid=1702 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:31.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564623063636237306666386631343430343734646562376236613136 May 10 01:16:31.257000 audit: BPF prog-id=82 op=UNLOAD May 10 01:16:31.257000 audit: BPF prog-id=81 op=UNLOAD May 10 01:16:31.258000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.258000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.258000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.258000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.258000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.258000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.258000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.258000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.258000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.258000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.258000 audit: BPF prog-id=83 op=LOAD May 10 01:16:31.258000 audit[1849]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000257f8 items=0 ppid=1702 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:31.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564623063636237306666386631343430343734646562376236613136 May 10 01:16:31.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.272000 audit: BPF prog-id=84 op=LOAD May 10 01:16:31.273000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1725 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:31.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633373739633334623030663663373365656166623136356230326335 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1725 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:31.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633373739633334623030663663373365656166623136356230326335 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit: BPF prog-id=85 op=LOAD May 10 01:16:31.273000 audit[1846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00024c790 items=0 ppid=1725 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:31.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633373739633334623030663663373365656166623136356230326335 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit: BPF prog-id=86 op=LOAD May 10 01:16:31.273000 audit[1846]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00024c7d8 items=0 ppid=1725 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:31.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633373739633334623030663663373365656166623136356230326335 May 10 01:16:31.273000 audit: BPF prog-id=86 op=UNLOAD May 10 01:16:31.273000 audit: BPF prog-id=85 op=UNLOAD May 10 01:16:31.273000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:31.273000 audit: BPF prog-id=87 op=LOAD May 10 01:16:31.273000 audit[1846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00024cbe8 items=0 ppid=1725 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:31.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633373739633334623030663663373365656166623136356230326335 May 10 01:16:31.290924 kubelet[1655]: I0510 01:16:31.290854 1655 kubelet_node_status.go:72] "Attempting to register node" node="srv-2kvu9.gb1.brightbox.com" May 10 01:16:31.291401 kubelet[1655]: E0510 01:16:31.291343 1655 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.244.17.126:6443/api/v1/nodes\": dial tcp 10.244.17.126:6443: connect: connection refused" node="srv-2kvu9.gb1.brightbox.com" May 10 01:16:31.297607 env[1189]: time="2025-05-10T01:16:31.297531126Z" level=info msg="StartContainer for \"ba17886e2cdadc884a389043611f7a2c3bbc2a957c4bc7fb05e7ead1a2404003\" returns successfully" May 10 01:16:31.323891 env[1189]: time="2025-05-10T01:16:31.318304977Z" level=info msg="StartContainer for \"edb0ccb70ff8f1440474deb7b6a16ab04a99d6b3d2ebeac07e5ce0807da5d63b\" returns successfully" May 10 01:16:31.394123 env[1189]: time="2025-05-10T01:16:31.394036514Z" level=info msg="StartContainer for \"f3779c34b00f6c73eeafb165b02c51869c0e99c7030e1cb135f1f83d8ee927df\" returns successfully" May 10 01:16:31.632436 kubelet[1655]: E0510 01:16:31.632245 1655 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.244.17.126:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.244.17.126:6443: connect: connection refused" logger="UnhandledError" May 10 01:16:32.691324 kubelet[1655]: E0510 01:16:32.691237 1655 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.17.126:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-2kvu9.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.17.126:6443: connect: connection refused" interval="3.2s" May 10 01:16:32.894498 kubelet[1655]: I0510 01:16:32.894449 1655 kubelet_node_status.go:72] "Attempting to register node" node="srv-2kvu9.gb1.brightbox.com" May 10 01:16:33.677000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:16:33.677000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00027f4d0 a2=fc6 a3=0 items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 key=(null) May 10 01:16:33.677000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:16:33.677000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:16:33.677000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000e36040 a2=fc6 a3=0 items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 key=(null) May 10 01:16:33.677000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:16:34.723678 kernel: kauditd_printk_skb: 388 callbacks suppressed May 10 01:16:34.724063 kernel: audit: type=1400 audit(1746839794.719:581): avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:16:34.719000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:16:34.720000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526356 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:16:34.735742 kernel: audit: type=1400 audit(1746839794.720:582): avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526356 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:16:34.720000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003ebd920 a2=fc6 a3=0 items=0 ppid=1725 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 key=(null) May 10 01:16:34.744786 kernel: audit: type=1300 audit(1746839794.720:582): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003ebd920 a2=fc6 a3=0 items=0 ppid=1725 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 key=(null) May 10 01:16:34.744983 kernel: audit: type=1327 audit(1746839794.720:582): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31372E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 01:16:34.720000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31372E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 01:16:34.719000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c007175da0 a2=fc6 a3=0 items=0 ppid=1725 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 key=(null) May 10 01:16:34.719000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31372E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 01:16:34.768486 kernel: audit: type=1300 audit(1746839794.719:581): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c007175da0 a2=fc6 a3=0 items=0 ppid=1725 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 key=(null) May 10 01:16:34.768642 kernel: audit: type=1327 audit(1746839794.719:581): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31372E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 01:16:34.722000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:16:34.790735 kernel: audit: type=1400 audit(1746839794.722:583): avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:16:34.722000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c006a3c8c0 a2=fc6 a3=0 items=0 ppid=1725 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 key=(null) May 10 01:16:34.808735 kernel: audit: type=1300 audit(1746839794.722:583): arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c006a3c8c0 a2=fc6 a3=0 items=0 ppid=1725 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 key=(null) May 10 01:16:34.722000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31372E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 01:16:34.752000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:16:34.833875 kernel: audit: type=1327 audit(1746839794.722:583): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31372E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 01:16:34.834077 kernel: audit: type=1400 audit(1746839794.752:584): avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:16:34.752000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c003ebddd0 a2=fc6 a3=0 items=0 ppid=1725 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 key=(null) May 10 01:16:34.752000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31372E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 01:16:34.798000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:16:34.798000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=57 a1=c003776cc0 a2=fc6 a3=0 items=0 ppid=1725 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 key=(null) May 10 01:16:34.798000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31372E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 01:16:34.808000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:16:34.808000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5a a1=c004a696c0 a2=fc6 a3=0 items=0 ppid=1725 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 key=(null) May 10 01:16:34.808000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31372E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 01:16:35.032623 kubelet[1655]: E0510 01:16:35.030126 1655 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{srv-2kvu9.gb1.brightbox.com.183e058893adfc7a default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-2kvu9.gb1.brightbox.com,UID:srv-2kvu9.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-2kvu9.gb1.brightbox.com,},FirstTimestamp:2025-05-10 01:16:29.617675386 +0000 UTC m=+0.694737615,LastTimestamp:2025-05-10 01:16:29.617675386 +0000 UTC m=+0.694737615,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-2kvu9.gb1.brightbox.com,}" May 10 01:16:35.064005 kubelet[1655]: I0510 01:16:35.063955 1655 kubelet_node_status.go:75] "Successfully registered node" node="srv-2kvu9.gb1.brightbox.com" May 10 01:16:35.064301 kubelet[1655]: E0510 01:16:35.064272 1655 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"srv-2kvu9.gb1.brightbox.com\": node \"srv-2kvu9.gb1.brightbox.com\" not found" May 10 01:16:35.087667 kubelet[1655]: E0510 01:16:35.087521 1655 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{srv-2kvu9.gb1.brightbox.com.183e0588959acc85 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-2kvu9.gb1.brightbox.com,UID:srv-2kvu9.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:srv-2kvu9.gb1.brightbox.com,},FirstTimestamp:2025-05-10 01:16:29.649972357 +0000 UTC m=+0.727034587,LastTimestamp:2025-05-10 01:16:29.649972357 +0000 UTC m=+0.727034587,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-2kvu9.gb1.brightbox.com,}" May 10 01:16:35.602797 kubelet[1655]: I0510 01:16:35.602726 1655 apiserver.go:52] "Watching apiserver" May 10 01:16:35.662501 kubelet[1655]: I0510 01:16:35.662419 1655 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 10 01:16:37.442458 systemd[1]: Reloading. May 10 01:16:37.576043 /usr/lib/systemd/system-generators/torcx-generator[1943]: time="2025-05-10T01:16:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 01:16:37.576212 /usr/lib/systemd/system-generators/torcx-generator[1943]: time="2025-05-10T01:16:37Z" level=info msg="torcx already run" May 10 01:16:37.695076 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 01:16:37.695533 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 01:16:37.731037 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 01:16:37.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.858000 audit: BPF prog-id=88 op=LOAD May 10 01:16:37.859000 audit: BPF prog-id=49 op=UNLOAD May 10 01:16:37.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.864000 audit: BPF prog-id=89 op=LOAD May 10 01:16:37.865000 audit: BPF prog-id=50 op=UNLOAD May 10 01:16:37.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.866000 audit: BPF prog-id=90 op=LOAD May 10 01:16:37.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.867000 audit: BPF prog-id=91 op=LOAD May 10 01:16:37.867000 audit: BPF prog-id=51 op=UNLOAD May 10 01:16:37.867000 audit: BPF prog-id=52 op=UNLOAD May 10 01:16:37.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.870000 audit: BPF prog-id=92 op=LOAD May 10 01:16:37.870000 audit: BPF prog-id=53 op=UNLOAD May 10 01:16:37.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.871000 audit: BPF prog-id=93 op=LOAD May 10 01:16:37.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.872000 audit: BPF prog-id=94 op=LOAD May 10 01:16:37.872000 audit: BPF prog-id=54 op=UNLOAD May 10 01:16:37.873000 audit: BPF prog-id=55 op=UNLOAD May 10 01:16:37.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.874000 audit: BPF prog-id=95 op=LOAD May 10 01:16:37.874000 audit: BPF prog-id=56 op=UNLOAD May 10 01:16:37.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.876000 audit: BPF prog-id=96 op=LOAD May 10 01:16:37.876000 audit: BPF prog-id=57 op=UNLOAD May 10 01:16:37.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.877000 audit: BPF prog-id=97 op=LOAD May 10 01:16:37.877000 audit: BPF prog-id=64 op=UNLOAD May 10 01:16:37.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.878000 audit: BPF prog-id=98 op=LOAD May 10 01:16:37.878000 audit: BPF prog-id=76 op=UNLOAD May 10 01:16:37.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit: BPF prog-id=99 op=LOAD May 10 01:16:37.883000 audit: BPF prog-id=58 op=UNLOAD May 10 01:16:37.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit: BPF prog-id=100 op=LOAD May 10 01:16:37.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.883000 audit: BPF prog-id=101 op=LOAD May 10 01:16:37.883000 audit: BPF prog-id=59 op=UNLOAD May 10 01:16:37.883000 audit: BPF prog-id=60 op=UNLOAD May 10 01:16:37.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.884000 audit: BPF prog-id=102 op=LOAD May 10 01:16:37.884000 audit: BPF prog-id=80 op=UNLOAD May 10 01:16:37.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.886000 audit: BPF prog-id=103 op=LOAD May 10 01:16:37.886000 audit: BPF prog-id=84 op=UNLOAD May 10 01:16:37.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.887000 audit: BPF prog-id=104 op=LOAD May 10 01:16:37.887000 audit: BPF prog-id=68 op=UNLOAD May 10 01:16:37.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.890000 audit: BPF prog-id=105 op=LOAD May 10 01:16:37.890000 audit: BPF prog-id=72 op=UNLOAD May 10 01:16:37.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.892000 audit: BPF prog-id=106 op=LOAD May 10 01:16:37.892000 audit: BPF prog-id=61 op=UNLOAD May 10 01:16:37.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.893000 audit: BPF prog-id=107 op=LOAD May 10 01:16:37.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:37.893000 audit: BPF prog-id=108 op=LOAD May 10 01:16:37.893000 audit: BPF prog-id=62 op=UNLOAD May 10 01:16:37.893000 audit: BPF prog-id=63 op=UNLOAD May 10 01:16:37.921906 systemd[1]: Stopping kubelet.service... May 10 01:16:37.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:37.945834 systemd[1]: kubelet.service: Deactivated successfully. May 10 01:16:37.946221 systemd[1]: Stopped kubelet.service. May 10 01:16:37.946379 systemd[1]: kubelet.service: Consumed 1.239s CPU time. May 10 01:16:37.951774 systemd[1]: Starting kubelet.service... May 10 01:16:39.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:39.237595 systemd[1]: Started kubelet.service. May 10 01:16:39.361000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:16:39.361000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000e37180 a2=fc6 a3=0 items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 key=(null) May 10 01:16:39.361000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:16:39.364000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:16:39.364000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e37340 a2=fc6 a3=0 items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 key=(null) May 10 01:16:39.364000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:16:39.366000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:16:39.366000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c8c640 a2=fc6 a3=0 items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 key=(null) May 10 01:16:39.366000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:16:39.368000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:16:39.368000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c8c660 a2=fc6 a3=0 items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 key=(null) May 10 01:16:39.368000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:16:39.378178 kubelet[1991]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 01:16:39.378924 kubelet[1991]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 01:16:39.379105 kubelet[1991]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 01:16:39.379427 kubelet[1991]: I0510 01:16:39.379360 1991 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 01:16:39.404774 kubelet[1991]: I0510 01:16:39.404669 1991 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 10 01:16:39.405051 kubelet[1991]: I0510 01:16:39.405026 1991 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 01:16:39.405772 kubelet[1991]: I0510 01:16:39.405564 1991 server.go:929] "Client rotation is on, will bootstrap in background" May 10 01:16:39.410726 kubelet[1991]: I0510 01:16:39.410655 1991 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 10 01:16:39.427796 kubelet[1991]: I0510 01:16:39.427738 1991 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 01:16:39.436527 kubelet[1991]: E0510 01:16:39.436473 1991 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 10 01:16:39.436527 kubelet[1991]: I0510 01:16:39.436525 1991 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 10 01:16:39.447098 kubelet[1991]: I0510 01:16:39.447056 1991 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 01:16:39.447560 kubelet[1991]: I0510 01:16:39.447535 1991 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 10 01:16:39.449100 kubelet[1991]: I0510 01:16:39.449046 1991 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 01:16:39.449549 kubelet[1991]: I0510 01:16:39.449255 1991 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-2kvu9.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 10 01:16:39.449925 kubelet[1991]: I0510 01:16:39.449897 1991 topology_manager.go:138] "Creating topology manager with none policy" May 10 01:16:39.450103 kubelet[1991]: I0510 01:16:39.450080 1991 container_manager_linux.go:300] "Creating device plugin manager" May 10 01:16:39.450848 kubelet[1991]: I0510 01:16:39.450286 1991 state_mem.go:36] "Initialized new in-memory state store" May 10 01:16:39.451227 kubelet[1991]: I0510 01:16:39.451204 1991 kubelet.go:408] "Attempting to sync node with API server" May 10 01:16:39.451788 kubelet[1991]: I0510 01:16:39.451757 1991 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 01:16:39.451984 kubelet[1991]: I0510 01:16:39.451959 1991 kubelet.go:314] "Adding apiserver pod source" May 10 01:16:39.452151 kubelet[1991]: I0510 01:16:39.452128 1991 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 01:16:39.501382 kubelet[1991]: I0510 01:16:39.500511 1991 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 01:16:39.504398 kubelet[1991]: I0510 01:16:39.504367 1991 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 01:16:39.506487 kubelet[1991]: I0510 01:16:39.506460 1991 server.go:1269] "Started kubelet" May 10 01:16:39.526885 kubelet[1991]: I0510 01:16:39.526809 1991 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 01:16:39.531304 kubelet[1991]: I0510 01:16:39.531254 1991 server.go:460] "Adding debug handlers to kubelet server" May 10 01:16:39.533994 kubelet[1991]: I0510 01:16:39.533917 1991 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 01:16:39.536064 kubelet[1991]: I0510 01:16:39.536037 1991 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 01:16:39.537000 audit[1991]: AVC avc: denied { mac_admin } for pid=1991 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:39.537000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 01:16:39.537000 audit[1991]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00037e870 a1=c00005a228 a2=c000629fb0 a3=25 items=0 ppid=1 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:39.537000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 01:16:39.541969 kubelet[1991]: I0510 01:16:39.541920 1991 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 01:16:39.541000 audit[1991]: AVC avc: denied { mac_admin } for pid=1991 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:39.541000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 01:16:39.541000 audit[1991]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006618e0 a1=c00005a2b8 a2=c00037eb10 a3=25 items=0 ppid=1 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:39.541000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 01:16:39.542620 kubelet[1991]: I0510 01:16:39.542590 1991 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 01:16:39.542818 kubelet[1991]: I0510 01:16:39.542793 1991 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 01:16:39.554089 kubelet[1991]: I0510 01:16:39.554048 1991 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 10 01:16:39.562669 kubelet[1991]: I0510 01:16:39.562629 1991 volume_manager.go:289] "Starting Kubelet Volume Manager" May 10 01:16:39.563688 kubelet[1991]: I0510 01:16:39.563653 1991 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 10 01:16:39.564135 kubelet[1991]: I0510 01:16:39.564112 1991 reconciler.go:26] "Reconciler: start to sync state" May 10 01:16:39.565972 kubelet[1991]: E0510 01:16:39.565942 1991 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 01:16:39.567908 kubelet[1991]: I0510 01:16:39.567880 1991 factory.go:221] Registration of the systemd container factory successfully May 10 01:16:39.568183 kubelet[1991]: I0510 01:16:39.568151 1991 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 01:16:39.573334 kubelet[1991]: I0510 01:16:39.573287 1991 factory.go:221] Registration of the containerd container factory successfully May 10 01:16:39.596168 kubelet[1991]: I0510 01:16:39.596105 1991 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 01:16:39.599495 kubelet[1991]: I0510 01:16:39.599455 1991 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 01:16:39.599819 kubelet[1991]: I0510 01:16:39.599768 1991 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 01:16:39.599987 kubelet[1991]: I0510 01:16:39.599961 1991 kubelet.go:2321] "Starting kubelet main sync loop" May 10 01:16:39.600229 kubelet[1991]: E0510 01:16:39.600194 1991 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 01:16:39.704931 kubelet[1991]: E0510 01:16:39.704887 1991 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 10 01:16:39.736317 kubelet[1991]: I0510 01:16:39.736253 1991 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 01:16:39.736662 kubelet[1991]: I0510 01:16:39.736634 1991 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 01:16:39.736904 kubelet[1991]: I0510 01:16:39.736882 1991 state_mem.go:36] "Initialized new in-memory state store" May 10 01:16:39.737496 kubelet[1991]: I0510 01:16:39.737466 1991 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 10 01:16:39.737671 kubelet[1991]: I0510 01:16:39.737628 1991 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 10 01:16:39.737888 kubelet[1991]: I0510 01:16:39.737865 1991 policy_none.go:49] "None policy: Start" May 10 01:16:39.739552 kubelet[1991]: I0510 01:16:39.739529 1991 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 01:16:39.739756 kubelet[1991]: I0510 01:16:39.739732 1991 state_mem.go:35] "Initializing new in-memory state store" May 10 01:16:39.742255 kubelet[1991]: I0510 01:16:39.742229 1991 state_mem.go:75] "Updated machine memory state" May 10 01:16:39.773783 kernel: kauditd_printk_skb: 274 callbacks suppressed May 10 01:16:39.773971 kernel: audit: type=1400 audit(1746839799.764:839): avc: denied { mac_admin } for pid=1991 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:39.764000 audit[1991]: AVC avc: denied { mac_admin } for pid=1991 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:39.774169 kubelet[1991]: I0510 01:16:39.765380 1991 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 01:16:39.774169 kubelet[1991]: I0510 01:16:39.765488 1991 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 01:16:39.774169 kubelet[1991]: I0510 01:16:39.766952 1991 eviction_manager.go:189] "Eviction manager: starting control loop" May 10 01:16:39.774169 kubelet[1991]: I0510 01:16:39.766981 1991 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 01:16:39.774169 kubelet[1991]: I0510 01:16:39.768637 1991 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 01:16:39.780132 kernel: audit: type=1401 audit(1746839799.764:839): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 01:16:39.764000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 01:16:39.764000 audit[1991]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b804e0 a1=c0007f9428 a2=c000b804b0 a3=25 items=0 ppid=1 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:39.789339 kernel: audit: type=1300 audit(1746839799.764:839): arch=c000003e syscall=188 success=no exit=-22 a0=c000b804e0 a1=c0007f9428 a2=c000b804b0 a3=25 items=0 ppid=1 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:39.807860 kernel: audit: type=1327 audit(1746839799.764:839): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 01:16:39.764000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 01:16:39.932743 kubelet[1991]: I0510 01:16:39.929972 1991 kubelet_node_status.go:72] "Attempting to register node" node="srv-2kvu9.gb1.brightbox.com" May 10 01:16:39.942594 kubelet[1991]: W0510 01:16:39.942530 1991 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 01:16:39.943585 kubelet[1991]: W0510 01:16:39.943561 1991 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 01:16:39.955961 kubelet[1991]: I0510 01:16:39.955914 1991 kubelet_node_status.go:111] "Node was previously registered" node="srv-2kvu9.gb1.brightbox.com" May 10 01:16:39.956337 kubelet[1991]: I0510 01:16:39.956313 1991 kubelet_node_status.go:75] "Successfully registered node" node="srv-2kvu9.gb1.brightbox.com" May 10 01:16:39.956603 kubelet[1991]: W0510 01:16:39.956571 1991 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 01:16:39.967637 kubelet[1991]: I0510 01:16:39.967372 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7f7fd2af7f4a98406fc2673bc41d3fbd-ca-certs\") pod \"kube-apiserver-srv-2kvu9.gb1.brightbox.com\" (UID: \"7f7fd2af7f4a98406fc2673bc41d3fbd\") " pod="kube-system/kube-apiserver-srv-2kvu9.gb1.brightbox.com" May 10 01:16:39.967637 kubelet[1991]: I0510 01:16:39.967425 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7f7fd2af7f4a98406fc2673bc41d3fbd-k8s-certs\") pod \"kube-apiserver-srv-2kvu9.gb1.brightbox.com\" (UID: \"7f7fd2af7f4a98406fc2673bc41d3fbd\") " pod="kube-system/kube-apiserver-srv-2kvu9.gb1.brightbox.com" May 10 01:16:39.967637 kubelet[1991]: I0510 01:16:39.967459 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7f7fd2af7f4a98406fc2673bc41d3fbd-usr-share-ca-certificates\") pod \"kube-apiserver-srv-2kvu9.gb1.brightbox.com\" (UID: \"7f7fd2af7f4a98406fc2673bc41d3fbd\") " pod="kube-system/kube-apiserver-srv-2kvu9.gb1.brightbox.com" May 10 01:16:39.967637 kubelet[1991]: I0510 01:16:39.967498 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/bac842beac1e806c0f85805243ae8155-ca-certs\") pod \"kube-controller-manager-srv-2kvu9.gb1.brightbox.com\" (UID: \"bac842beac1e806c0f85805243ae8155\") " pod="kube-system/kube-controller-manager-srv-2kvu9.gb1.brightbox.com" May 10 01:16:39.967637 kubelet[1991]: I0510 01:16:39.967583 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/bac842beac1e806c0f85805243ae8155-flexvolume-dir\") pod \"kube-controller-manager-srv-2kvu9.gb1.brightbox.com\" (UID: \"bac842beac1e806c0f85805243ae8155\") " pod="kube-system/kube-controller-manager-srv-2kvu9.gb1.brightbox.com" May 10 01:16:39.968195 kubelet[1991]: I0510 01:16:39.967636 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/bac842beac1e806c0f85805243ae8155-kubeconfig\") pod \"kube-controller-manager-srv-2kvu9.gb1.brightbox.com\" (UID: \"bac842beac1e806c0f85805243ae8155\") " pod="kube-system/kube-controller-manager-srv-2kvu9.gb1.brightbox.com" May 10 01:16:39.968195 kubelet[1991]: I0510 01:16:39.967671 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/bac842beac1e806c0f85805243ae8155-k8s-certs\") pod \"kube-controller-manager-srv-2kvu9.gb1.brightbox.com\" (UID: \"bac842beac1e806c0f85805243ae8155\") " pod="kube-system/kube-controller-manager-srv-2kvu9.gb1.brightbox.com" May 10 01:16:39.968195 kubelet[1991]: I0510 01:16:39.967700 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/bac842beac1e806c0f85805243ae8155-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-2kvu9.gb1.brightbox.com\" (UID: \"bac842beac1e806c0f85805243ae8155\") " pod="kube-system/kube-controller-manager-srv-2kvu9.gb1.brightbox.com" May 10 01:16:39.968195 kubelet[1991]: I0510 01:16:39.967768 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/55b554a4daa22224d93e0824a54c9698-kubeconfig\") pod \"kube-scheduler-srv-2kvu9.gb1.brightbox.com\" (UID: \"55b554a4daa22224d93e0824a54c9698\") " pod="kube-system/kube-scheduler-srv-2kvu9.gb1.brightbox.com" May 10 01:16:40.454615 kubelet[1991]: I0510 01:16:40.454485 1991 apiserver.go:52] "Watching apiserver" May 10 01:16:40.464928 kubelet[1991]: I0510 01:16:40.464853 1991 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 10 01:16:40.558516 kubelet[1991]: I0510 01:16:40.558419 1991 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-srv-2kvu9.gb1.brightbox.com" podStartSLOduration=1.558380526 podStartE2EDuration="1.558380526s" podCreationTimestamp="2025-05-10 01:16:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 01:16:40.553846584 +0000 UTC m=+1.293551658" watchObservedRunningTime="2025-05-10 01:16:40.558380526 +0000 UTC m=+1.298085601" May 10 01:16:40.585977 kubelet[1991]: I0510 01:16:40.585835 1991 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-srv-2kvu9.gb1.brightbox.com" podStartSLOduration=1.58580768 podStartE2EDuration="1.58580768s" podCreationTimestamp="2025-05-10 01:16:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 01:16:40.583953032 +0000 UTC m=+1.323658129" watchObservedRunningTime="2025-05-10 01:16:40.58580768 +0000 UTC m=+1.325512752" May 10 01:16:40.586357 kubelet[1991]: I0510 01:16:40.586061 1991 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-srv-2kvu9.gb1.brightbox.com" podStartSLOduration=1.586052534 podStartE2EDuration="1.586052534s" podCreationTimestamp="2025-05-10 01:16:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 01:16:40.571695664 +0000 UTC m=+1.311400747" watchObservedRunningTime="2025-05-10 01:16:40.586052534 +0000 UTC m=+1.325757606" May 10 01:16:43.307000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526387 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 10 01:16:43.319722 kernel: audit: type=1400 audit(1746839803.307:840): avc: denied { watch } for pid=1830 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526387 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 10 01:16:43.348131 kernel: audit: type=1300 audit(1746839803.307:840): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f84e80 a2=fc6 a3=0 items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 key=(null) May 10 01:16:43.307000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f84e80 a2=fc6 a3=0 items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 key=(null) May 10 01:16:43.307000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:16:43.369736 kernel: audit: type=1327 audit(1746839803.307:840): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:16:43.981894 kubelet[1991]: I0510 01:16:43.981765 1991 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 10 01:16:43.984179 env[1189]: time="2025-05-10T01:16:43.984055786Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 10 01:16:43.992004 kubelet[1991]: I0510 01:16:43.991948 1991 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 10 01:16:44.482319 sudo[1377]: pam_unix(sudo:session): session closed for user root May 10 01:16:44.480000 audit[1377]: USER_END pid=1377 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 01:16:44.481000 audit[1377]: CRED_DISP pid=1377 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 01:16:44.495400 kernel: audit: type=1106 audit(1746839804.480:841): pid=1377 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 01:16:44.495531 kernel: audit: type=1104 audit(1746839804.481:842): pid=1377 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 01:16:44.639951 sshd[1374]: pam_unix(sshd:session): session closed for user core May 10 01:16:44.642000 audit[1374]: USER_END pid=1374 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:16:44.652757 kernel: audit: type=1106 audit(1746839804.642:843): pid=1374 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:16:44.649000 audit[1374]: CRED_DISP pid=1374 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:16:44.653567 systemd[1]: sshd@8-10.244.17.126:22-139.178.68.195:38772.service: Deactivated successfully. May 10 01:16:44.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.17.126:22-139.178.68.195:38772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:16:44.657743 systemd[1]: session-9.scope: Deactivated successfully. May 10 01:16:44.658069 systemd[1]: session-9.scope: Consumed 8.546s CPU time. May 10 01:16:44.659237 systemd-logind[1185]: Session 9 logged out. Waiting for processes to exit. May 10 01:16:44.662245 systemd-logind[1185]: Removed session 9. May 10 01:16:44.781908 systemd[1]: Created slice kubepods-besteffort-pode2ec326b_6d4d_483c_9ebf_9a9675fce6eb.slice. May 10 01:16:44.802347 kubelet[1991]: I0510 01:16:44.802275 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e2ec326b-6d4d-483c-9ebf-9a9675fce6eb-xtables-lock\") pod \"kube-proxy-dkhx8\" (UID: \"e2ec326b-6d4d-483c-9ebf-9a9675fce6eb\") " pod="kube-system/kube-proxy-dkhx8" May 10 01:16:44.802666 kubelet[1991]: I0510 01:16:44.802440 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zt25d\" (UniqueName: \"kubernetes.io/projected/e2ec326b-6d4d-483c-9ebf-9a9675fce6eb-kube-api-access-zt25d\") pod \"kube-proxy-dkhx8\" (UID: \"e2ec326b-6d4d-483c-9ebf-9a9675fce6eb\") " pod="kube-system/kube-proxy-dkhx8" May 10 01:16:44.802666 kubelet[1991]: I0510 01:16:44.802527 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e2ec326b-6d4d-483c-9ebf-9a9675fce6eb-kube-proxy\") pod \"kube-proxy-dkhx8\" (UID: \"e2ec326b-6d4d-483c-9ebf-9a9675fce6eb\") " pod="kube-system/kube-proxy-dkhx8" May 10 01:16:44.802666 kubelet[1991]: I0510 01:16:44.802559 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e2ec326b-6d4d-483c-9ebf-9a9675fce6eb-lib-modules\") pod \"kube-proxy-dkhx8\" (UID: \"e2ec326b-6d4d-483c-9ebf-9a9675fce6eb\") " pod="kube-system/kube-proxy-dkhx8" May 10 01:16:44.918890 kubelet[1991]: I0510 01:16:44.918818 1991 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 10 01:16:45.004623 systemd[1]: Created slice kubepods-besteffort-pod42abce16_5f79_4c5e_8a60_a21d6c970bf3.slice. May 10 01:16:45.006349 kubelet[1991]: I0510 01:16:45.006310 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/42abce16-5f79-4c5e-8a60-a21d6c970bf3-var-lib-calico\") pod \"tigera-operator-6f6897fdc5-v92mv\" (UID: \"42abce16-5f79-4c5e-8a60-a21d6c970bf3\") " pod="tigera-operator/tigera-operator-6f6897fdc5-v92mv" May 10 01:16:45.007025 kubelet[1991]: I0510 01:16:45.006990 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-chnqd\" (UniqueName: \"kubernetes.io/projected/42abce16-5f79-4c5e-8a60-a21d6c970bf3-kube-api-access-chnqd\") pod \"tigera-operator-6f6897fdc5-v92mv\" (UID: \"42abce16-5f79-4c5e-8a60-a21d6c970bf3\") " pod="tigera-operator/tigera-operator-6f6897fdc5-v92mv" May 10 01:16:45.096802 env[1189]: time="2025-05-10T01:16:45.095846152Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dkhx8,Uid:e2ec326b-6d4d-483c-9ebf-9a9675fce6eb,Namespace:kube-system,Attempt:0,}" May 10 01:16:45.148474 env[1189]: time="2025-05-10T01:16:45.148339681Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:16:45.148474 env[1189]: time="2025-05-10T01:16:45.148431005Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:16:45.148877 env[1189]: time="2025-05-10T01:16:45.148449723Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:16:45.150126 env[1189]: time="2025-05-10T01:16:45.150034213Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8702690007ec9904104267ae2187f5af833d4b36e085ed26bce2f3b68c438a80 pid=2076 runtime=io.containerd.runc.v2 May 10 01:16:45.208946 systemd[1]: Started cri-containerd-8702690007ec9904104267ae2187f5af833d4b36e085ed26bce2f3b68c438a80.scope. May 10 01:16:45.230974 kernel: kauditd_printk_skb: 2 callbacks suppressed May 10 01:16:45.231233 kernel: audit: type=1400 audit(1746839805.222:846): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.237310 kernel: audit: type=1400 audit(1746839805.222:847): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.242785 kernel: audit: type=1400 audit(1746839805.222:848): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.264312 kernel: audit: type=1400 audit(1746839805.222:849): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.264505 kernel: audit: type=1400 audit(1746839805.222:850): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.264585 kernel: audit: type=1400 audit(1746839805.222:851): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.264667 kernel: audit: type=1400 audit(1746839805.222:852): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.264751 kernel: audit: type=1400 audit(1746839805.222:853): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.276701 kernel: audit: type=1400 audit(1746839805.222:854): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.276886 kernel: audit: type=1400 audit(1746839805.229:855): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.229000 audit: BPF prog-id=109 op=LOAD May 10 01:16:45.236000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.236000 audit[2087]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2076 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:45.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837303236393030303765633939303431303432363761653231383766 May 10 01:16:45.236000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.236000 audit[2087]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2076 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:45.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837303236393030303765633939303431303432363761653231383766 May 10 01:16:45.236000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.236000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.236000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.236000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.236000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.236000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.236000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.236000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.236000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.236000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.236000 audit: BPF prog-id=110 op=LOAD May 10 01:16:45.236000 audit[2087]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000167800 items=0 ppid=2076 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:45.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837303236393030303765633939303431303432363761653231383766 May 10 01:16:45.241000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.241000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.241000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.241000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.241000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.241000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.241000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.241000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.241000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.241000 audit: BPF prog-id=111 op=LOAD May 10 01:16:45.241000 audit[2087]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000167848 items=0 ppid=2076 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:45.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837303236393030303765633939303431303432363761653231383766 May 10 01:16:45.241000 audit: BPF prog-id=111 op=UNLOAD May 10 01:16:45.241000 audit: BPF prog-id=110 op=UNLOAD May 10 01:16:45.241000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.241000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.241000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.241000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.241000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.241000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.241000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.241000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.241000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.241000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.241000 audit: BPF prog-id=112 op=LOAD May 10 01:16:45.241000 audit[2087]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000167c58 items=0 ppid=2076 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:45.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837303236393030303765633939303431303432363761653231383766 May 10 01:16:45.303528 env[1189]: time="2025-05-10T01:16:45.303451532Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dkhx8,Uid:e2ec326b-6d4d-483c-9ebf-9a9675fce6eb,Namespace:kube-system,Attempt:0,} returns sandbox id \"8702690007ec9904104267ae2187f5af833d4b36e085ed26bce2f3b68c438a80\"" May 10 01:16:45.309233 env[1189]: time="2025-05-10T01:16:45.309181207Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-v92mv,Uid:42abce16-5f79-4c5e-8a60-a21d6c970bf3,Namespace:tigera-operator,Attempt:0,}" May 10 01:16:45.312206 env[1189]: time="2025-05-10T01:16:45.312102900Z" level=info msg="CreateContainer within sandbox \"8702690007ec9904104267ae2187f5af833d4b36e085ed26bce2f3b68c438a80\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 10 01:16:45.363558 env[1189]: time="2025-05-10T01:16:45.359077947Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:16:45.363558 env[1189]: time="2025-05-10T01:16:45.359219687Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:16:45.363558 env[1189]: time="2025-05-10T01:16:45.359282681Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:16:45.363558 env[1189]: time="2025-05-10T01:16:45.361779333Z" level=info msg="CreateContainer within sandbox \"8702690007ec9904104267ae2187f5af833d4b36e085ed26bce2f3b68c438a80\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"85b2132e6f1d9c02546478f1fffe8fc66c8b4e8ed65e40a45428a92037656935\"" May 10 01:16:45.366987 env[1189]: time="2025-05-10T01:16:45.364433451Z" level=info msg="StartContainer for \"85b2132e6f1d9c02546478f1fffe8fc66c8b4e8ed65e40a45428a92037656935\"" May 10 01:16:45.367618 env[1189]: time="2025-05-10T01:16:45.367296516Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/982aa3aa7274cf72a805bca197f4e961e318db574486e4599c449c910993ae40 pid=2116 runtime=io.containerd.runc.v2 May 10 01:16:45.395571 systemd[1]: Started cri-containerd-982aa3aa7274cf72a805bca197f4e961e318db574486e4599c449c910993ae40.scope. May 10 01:16:45.421289 systemd[1]: Started cri-containerd-85b2132e6f1d9c02546478f1fffe8fc66c8b4e8ed65e40a45428a92037656935.scope. May 10 01:16:45.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.443000 audit: BPF prog-id=113 op=LOAD May 10 01:16:45.443000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.443000 audit[2127]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2116 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:45.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938326161336161373237346366373261383035626361313937663465 May 10 01:16:45.443000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.443000 audit[2127]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2116 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:45.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938326161336161373237346366373261383035626361313937663465 May 10 01:16:45.443000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.443000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.443000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.443000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.443000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.443000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.443000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.443000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.443000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.443000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.443000 audit: BPF prog-id=114 op=LOAD May 10 01:16:45.443000 audit[2127]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ca970 items=0 ppid=2116 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:45.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938326161336161373237346366373261383035626361313937663465 May 10 01:16:45.444000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.444000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.444000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.444000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.444000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.444000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.444000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.444000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.444000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.444000 audit: BPF prog-id=115 op=LOAD May 10 01:16:45.444000 audit[2127]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ca9b8 items=0 ppid=2116 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:45.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938326161336161373237346366373261383035626361313937663465 May 10 01:16:45.444000 audit: BPF prog-id=115 op=UNLOAD May 10 01:16:45.444000 audit: BPF prog-id=114 op=UNLOAD May 10 01:16:45.444000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.444000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.444000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.444000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.444000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.444000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.444000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.444000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.444000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.444000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.444000 audit: BPF prog-id=116 op=LOAD May 10 01:16:45.444000 audit[2127]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001cadc8 items=0 ppid=2116 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:45.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938326161336161373237346366373261383035626361313937663465 May 10 01:16:45.467000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.467000 audit[2140]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f2655b65a48 items=0 ppid=2076 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:45.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835623231333265366631643963303235343634373866316666666538 May 10 01:16:45.467000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.467000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.467000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.467000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.467000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.467000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.467000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.467000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.467000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.467000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.467000 audit: BPF prog-id=117 op=LOAD May 10 01:16:45.467000 audit[2140]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000358248 items=0 ppid=2076 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:45.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835623231333265366631643963303235343634373866316666666538 May 10 01:16:45.468000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.468000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.468000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.468000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.468000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.468000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.468000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.468000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.468000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.468000 audit: BPF prog-id=118 op=LOAD May 10 01:16:45.468000 audit[2140]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000358298 items=0 ppid=2076 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:45.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835623231333265366631643963303235343634373866316666666538 May 10 01:16:45.468000 audit: BPF prog-id=118 op=UNLOAD May 10 01:16:45.468000 audit: BPF prog-id=117 op=UNLOAD May 10 01:16:45.468000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.468000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.468000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.468000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.468000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.468000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.468000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.468000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.468000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.468000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:45.468000 audit: BPF prog-id=119 op=LOAD May 10 01:16:45.468000 audit[2140]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000358328 items=0 ppid=2076 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:45.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835623231333265366631643963303235343634373866316666666538 May 10 01:16:45.503751 env[1189]: time="2025-05-10T01:16:45.502810818Z" level=info msg="StartContainer for \"85b2132e6f1d9c02546478f1fffe8fc66c8b4e8ed65e40a45428a92037656935\" returns successfully" May 10 01:16:45.513164 env[1189]: time="2025-05-10T01:16:45.513068455Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-v92mv,Uid:42abce16-5f79-4c5e-8a60-a21d6c970bf3,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"982aa3aa7274cf72a805bca197f4e961e318db574486e4599c449c910993ae40\"" May 10 01:16:45.518476 env[1189]: time="2025-05-10T01:16:45.518425084Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 10 01:16:45.685584 kubelet[1991]: I0510 01:16:45.685336 1991 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-dkhx8" podStartSLOduration=1.685283772 podStartE2EDuration="1.685283772s" podCreationTimestamp="2025-05-10 01:16:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 01:16:45.684322993 +0000 UTC m=+6.424028081" watchObservedRunningTime="2025-05-10 01:16:45.685283772 +0000 UTC m=+6.424988844" May 10 01:16:46.015000 audit[2216]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.015000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdfd254e00 a2=0 a3=7ffdfd254dec items=0 ppid=2163 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.015000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 01:16:46.016000 audit[2217]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.016000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9b571b40 a2=0 a3=7fff9b571b2c items=0 ppid=2163 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.016000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 01:16:46.018000 audit[2219]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.018000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5a057b90 a2=0 a3=7fff5a057b7c items=0 ppid=2163 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.018000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 01:16:46.019000 audit[2220]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.019000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc952efa20 a2=0 a3=7ffc952efa0c items=0 ppid=2163 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.019000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 01:16:46.022000 audit[2222]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.022000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2ae114e0 a2=0 a3=7ffc2ae114cc items=0 ppid=2163 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.022000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 01:16:46.023000 audit[2221]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.023000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe049da3b0 a2=0 a3=7ffe049da39c items=0 ppid=2163 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.023000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 01:16:46.140000 audit[2224]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.140000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd902c6d50 a2=0 a3=7ffd902c6d3c items=0 ppid=2163 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.140000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 01:16:46.145000 audit[2226]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.145000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe0b404bc0 a2=0 a3=7ffe0b404bac items=0 ppid=2163 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.145000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 10 01:16:46.154000 audit[2229]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.154000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdcc5f9070 a2=0 a3=7ffdcc5f905c items=0 ppid=2163 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.154000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 10 01:16:46.157000 audit[2230]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.157000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdedeae9d0 a2=0 a3=7ffdedeae9bc items=0 ppid=2163 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.157000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 01:16:46.162000 audit[2232]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.162000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcfb37ded0 a2=0 a3=7ffcfb37debc items=0 ppid=2163 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.162000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 01:16:46.162000 audit[2233]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.162000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1a4c6a90 a2=0 a3=7ffe1a4c6a7c items=0 ppid=2163 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.162000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 01:16:46.169000 audit[2235]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.169000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffe22031b0 a2=0 a3=7fffe220319c items=0 ppid=2163 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.169000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 01:16:46.177000 audit[2238]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.177000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcf199a820 a2=0 a3=7ffcf199a80c items=0 ppid=2163 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.177000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 10 01:16:46.179000 audit[2239]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.179000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd47e5e090 a2=0 a3=7ffd47e5e07c items=0 ppid=2163 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.179000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 01:16:46.183000 audit[2241]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.183000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffef2fb5270 a2=0 a3=7ffef2fb525c items=0 ppid=2163 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.183000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 01:16:46.183000 audit[2242]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.183000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe4556590 a2=0 a3=7fffe455657c items=0 ppid=2163 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.183000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 01:16:46.190000 audit[2244]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2244 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.190000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc6adb8880 a2=0 a3=7ffc6adb886c items=0 ppid=2163 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.190000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 01:16:46.196000 audit[2247]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.196000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff5ecae700 a2=0 a3=7fff5ecae6ec items=0 ppid=2163 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.196000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 01:16:46.202000 audit[2250]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.202000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc8053d0f0 a2=0 a3=7ffc8053d0dc items=0 ppid=2163 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.202000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 01:16:46.204000 audit[2251]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.204000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe9695d220 a2=0 a3=7ffe9695d20c items=0 ppid=2163 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.204000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 01:16:46.209000 audit[2253]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.209000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc4f22cea0 a2=0 a3=7ffc4f22ce8c items=0 ppid=2163 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.209000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 01:16:46.215000 audit[2256]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.215000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe62edc410 a2=0 a3=7ffe62edc3fc items=0 ppid=2163 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.215000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 01:16:46.217000 audit[2257]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.217000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd398165a0 a2=0 a3=7ffd3981658c items=0 ppid=2163 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.217000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 01:16:46.221000 audit[2259]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:16:46.221000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffdb649df40 a2=0 a3=7ffdb649df2c items=0 ppid=2163 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.221000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 01:16:46.265000 audit[2265]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:16:46.265000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd1266c690 a2=0 a3=7ffd1266c67c items=0 ppid=2163 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.265000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:16:46.278000 audit[2265]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:16:46.278000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffd1266c690 a2=0 a3=7ffd1266c67c items=0 ppid=2163 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.278000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:16:46.281000 audit[2270]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.281000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffad2d9430 a2=0 a3=7fffad2d941c items=0 ppid=2163 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.281000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 01:16:46.286000 audit[2272]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.286000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc22da3fc0 a2=0 a3=7ffc22da3fac items=0 ppid=2163 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.286000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 10 01:16:46.293000 audit[2275]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.293000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd6d3bd400 a2=0 a3=7ffd6d3bd3ec items=0 ppid=2163 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.293000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 10 01:16:46.295000 audit[2276]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.295000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea2a3ca00 a2=0 a3=7ffea2a3c9ec items=0 ppid=2163 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.295000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 01:16:46.298000 audit[2278]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.298000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe963911e0 a2=0 a3=7ffe963911cc items=0 ppid=2163 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.298000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 01:16:46.298000 audit[2279]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.298000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb774eb60 a2=0 a3=7ffdb774eb4c items=0 ppid=2163 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.298000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 01:16:46.303000 audit[2281]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.303000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffff7a01e30 a2=0 a3=7ffff7a01e1c items=0 ppid=2163 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.303000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 10 01:16:46.311000 audit[2284]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.311000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffebf0eb460 a2=0 a3=7ffebf0eb44c items=0 ppid=2163 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.311000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 01:16:46.312000 audit[2285]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.312000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbc2113d0 a2=0 a3=7ffcbc2113bc items=0 ppid=2163 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.312000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 01:16:46.318000 audit[2287]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.318000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd6e716fc0 a2=0 a3=7ffd6e716fac items=0 ppid=2163 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.318000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 01:16:46.320000 audit[2288]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.320000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdedef5d30 a2=0 a3=7ffdedef5d1c items=0 ppid=2163 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 01:16:46.325000 audit[2290]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.325000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd0bd555e0 a2=0 a3=7ffd0bd555cc items=0 ppid=2163 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.325000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 01:16:46.332000 audit[2293]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.332000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff67397e00 a2=0 a3=7fff67397dec items=0 ppid=2163 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.332000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 01:16:46.341000 audit[2296]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2296 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.341000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe4d1eb6a0 a2=0 a3=7ffe4d1eb68c items=0 ppid=2163 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.341000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 10 01:16:46.344000 audit[2297]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.344000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc476f5b50 a2=0 a3=7ffc476f5b3c items=0 ppid=2163 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.344000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 01:16:46.348000 audit[2299]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.348000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffffdc48860 a2=0 a3=7ffffdc4884c items=0 ppid=2163 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.348000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 01:16:46.354000 audit[2302]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.354000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd43831bb0 a2=0 a3=7ffd43831b9c items=0 ppid=2163 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.354000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 01:16:46.356000 audit[2303]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.356000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe79cf6240 a2=0 a3=7ffe79cf622c items=0 ppid=2163 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.356000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 01:16:46.365000 audit[2305]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.365000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff9057c7c0 a2=0 a3=7fff9057c7ac items=0 ppid=2163 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.365000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 01:16:46.368000 audit[2306]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.368000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd81b2e240 a2=0 a3=7ffd81b2e22c items=0 ppid=2163 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.368000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 01:16:46.372000 audit[2308]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.372000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffebb7b9130 a2=0 a3=7ffebb7b911c items=0 ppid=2163 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.372000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 01:16:46.380000 audit[2311]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:16:46.380000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff81893d70 a2=0 a3=7fff81893d5c items=0 ppid=2163 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.380000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 01:16:46.385000 audit[2313]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 01:16:46.385000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffddd755750 a2=0 a3=7ffddd75573c items=0 ppid=2163 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.385000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:16:46.386000 audit[2313]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 01:16:46.386000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffddd755750 a2=0 a3=7ffddd75573c items=0 ppid=2163 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:46.386000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:16:47.378835 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1229001337.mount: Deactivated successfully. May 10 01:16:48.885915 env[1189]: time="2025-05-10T01:16:48.885801868Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:48.888150 env[1189]: time="2025-05-10T01:16:48.888105064Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:48.890642 env[1189]: time="2025-05-10T01:16:48.890593954Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:48.892511 env[1189]: time="2025-05-10T01:16:48.892470398Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:48.896452 env[1189]: time="2025-05-10T01:16:48.896354899Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 10 01:16:48.932266 env[1189]: time="2025-05-10T01:16:48.932155363Z" level=info msg="CreateContainer within sandbox \"982aa3aa7274cf72a805bca197f4e961e318db574486e4599c449c910993ae40\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 10 01:16:48.948222 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount371924757.mount: Deactivated successfully. May 10 01:16:48.962862 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount279834750.mount: Deactivated successfully. May 10 01:16:48.968834 env[1189]: time="2025-05-10T01:16:48.968554779Z" level=info msg="CreateContainer within sandbox \"982aa3aa7274cf72a805bca197f4e961e318db574486e4599c449c910993ae40\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"f4d9a6e77c8ee899537f4539235035fe8c4b8c8cbf4a1b4f984a5acb6bda4d47\"" May 10 01:16:48.971479 env[1189]: time="2025-05-10T01:16:48.971395585Z" level=info msg="StartContainer for \"f4d9a6e77c8ee899537f4539235035fe8c4b8c8cbf4a1b4f984a5acb6bda4d47\"" May 10 01:16:49.035308 systemd[1]: Started cri-containerd-f4d9a6e77c8ee899537f4539235035fe8c4b8c8cbf4a1b4f984a5acb6bda4d47.scope. May 10 01:16:49.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.061000 audit: BPF prog-id=120 op=LOAD May 10 01:16:49.063000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.063000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=2116 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:49.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634643961366537376338656538393935333766343533393233353033 May 10 01:16:49.063000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.063000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=2116 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:49.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634643961366537376338656538393935333766343533393233353033 May 10 01:16:49.063000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.063000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.063000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.063000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.063000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.063000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.063000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.063000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.063000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.063000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.063000 audit: BPF prog-id=121 op=LOAD May 10 01:16:49.063000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c00038c390 items=0 ppid=2116 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:49.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634643961366537376338656538393935333766343533393233353033 May 10 01:16:49.065000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.065000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.065000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.065000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.065000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.065000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.065000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.065000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.065000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.065000 audit: BPF prog-id=122 op=LOAD May 10 01:16:49.065000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c00038c3d8 items=0 ppid=2116 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:49.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634643961366537376338656538393935333766343533393233353033 May 10 01:16:49.065000 audit: BPF prog-id=122 op=UNLOAD May 10 01:16:49.065000 audit: BPF prog-id=121 op=UNLOAD May 10 01:16:49.065000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.065000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.065000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.065000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.065000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.065000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.065000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.065000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.065000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.065000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:49.065000 audit: BPF prog-id=123 op=LOAD May 10 01:16:49.065000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c00038c7e8 items=0 ppid=2116 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:49.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634643961366537376338656538393935333766343533393233353033 May 10 01:16:49.093362 env[1189]: time="2025-05-10T01:16:49.093292876Z" level=info msg="StartContainer for \"f4d9a6e77c8ee899537f4539235035fe8c4b8c8cbf4a1b4f984a5acb6bda4d47\" returns successfully" May 10 01:16:52.429270 kernel: kauditd_printk_skb: 357 callbacks suppressed May 10 01:16:52.429600 kernel: audit: type=1325 audit(1746839812.420:957): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:16:52.420000 audit[2354]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:16:52.420000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff14cae3f0 a2=0 a3=7fff14cae3dc items=0 ppid=2163 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:52.439752 kernel: audit: type=1300 audit(1746839812.420:957): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff14cae3f0 a2=0 a3=7fff14cae3dc items=0 ppid=2163 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:52.420000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:16:52.448744 kernel: audit: type=1327 audit(1746839812.420:957): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:16:52.456000 audit[2354]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:16:52.456000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff14cae3f0 a2=0 a3=0 items=0 ppid=2163 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:52.470210 kernel: audit: type=1325 audit(1746839812.456:958): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:16:52.470429 kernel: audit: type=1300 audit(1746839812.456:958): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff14cae3f0 a2=0 a3=0 items=0 ppid=2163 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:52.470502 kernel: audit: type=1327 audit(1746839812.456:958): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:16:52.456000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:16:52.494000 audit[2356]: NETFILTER_CFG table=filter:91 family=2 entries=17 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:16:52.494000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffe44aeec50 a2=0 a3=7ffe44aeec3c items=0 ppid=2163 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:52.508608 kernel: audit: type=1325 audit(1746839812.494:959): table=filter:91 family=2 entries=17 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:16:52.508874 kernel: audit: type=1300 audit(1746839812.494:959): arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffe44aeec50 a2=0 a3=7ffe44aeec3c items=0 ppid=2163 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:52.494000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:16:52.515736 kernel: audit: type=1327 audit(1746839812.494:959): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:16:52.517000 audit[2356]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:16:52.517000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe44aeec50 a2=0 a3=0 items=0 ppid=2163 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:52.523738 kernel: audit: type=1325 audit(1746839812.517:960): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:16:52.517000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:16:52.543641 kubelet[1991]: I0510 01:16:52.543512 1991 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6f6897fdc5-v92mv" podStartSLOduration=5.143737335 podStartE2EDuration="8.54330769s" podCreationTimestamp="2025-05-10 01:16:44 +0000 UTC" firstStartedPulling="2025-05-10 01:16:45.516277897 +0000 UTC m=+6.255982960" lastFinishedPulling="2025-05-10 01:16:48.915848247 +0000 UTC m=+9.655553315" observedRunningTime="2025-05-10 01:16:49.701691448 +0000 UTC m=+10.441396527" watchObservedRunningTime="2025-05-10 01:16:52.54330769 +0000 UTC m=+13.283012766" May 10 01:16:52.557417 systemd[1]: Created slice kubepods-besteffort-poda2353b9d_fa50_49d3_b8e1_c3002146a949.slice. May 10 01:16:52.744976 kubelet[1991]: I0510 01:16:52.744903 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a2353b9d-fa50-49d3-b8e1-c3002146a949-tigera-ca-bundle\") pod \"calico-typha-56484ccbdd-vmq9x\" (UID: \"a2353b9d-fa50-49d3-b8e1-c3002146a949\") " pod="calico-system/calico-typha-56484ccbdd-vmq9x" May 10 01:16:52.745317 kubelet[1991]: I0510 01:16:52.745287 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/a2353b9d-fa50-49d3-b8e1-c3002146a949-typha-certs\") pod \"calico-typha-56484ccbdd-vmq9x\" (UID: \"a2353b9d-fa50-49d3-b8e1-c3002146a949\") " pod="calico-system/calico-typha-56484ccbdd-vmq9x" May 10 01:16:52.745501 kubelet[1991]: I0510 01:16:52.745466 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m7kd2\" (UniqueName: \"kubernetes.io/projected/a2353b9d-fa50-49d3-b8e1-c3002146a949-kube-api-access-m7kd2\") pod \"calico-typha-56484ccbdd-vmq9x\" (UID: \"a2353b9d-fa50-49d3-b8e1-c3002146a949\") " pod="calico-system/calico-typha-56484ccbdd-vmq9x" May 10 01:16:52.821122 systemd[1]: Created slice kubepods-besteffort-podc50ff685_6cab_4341_8171_30fd3767a1f1.slice. May 10 01:16:52.846095 kubelet[1991]: I0510 01:16:52.846041 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/c50ff685-6cab-4341-8171-30fd3767a1f1-var-run-calico\") pod \"calico-node-z8jt6\" (UID: \"c50ff685-6cab-4341-8171-30fd3767a1f1\") " pod="calico-system/calico-node-z8jt6" May 10 01:16:52.846482 kubelet[1991]: I0510 01:16:52.846445 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c50ff685-6cab-4341-8171-30fd3767a1f1-var-lib-calico\") pod \"calico-node-z8jt6\" (UID: \"c50ff685-6cab-4341-8171-30fd3767a1f1\") " pod="calico-system/calico-node-z8jt6" May 10 01:16:52.848093 kubelet[1991]: I0510 01:16:52.848063 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/c50ff685-6cab-4341-8171-30fd3767a1f1-node-certs\") pod \"calico-node-z8jt6\" (UID: \"c50ff685-6cab-4341-8171-30fd3767a1f1\") " pod="calico-system/calico-node-z8jt6" May 10 01:16:52.848421 kubelet[1991]: I0510 01:16:52.848390 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c50ff685-6cab-4341-8171-30fd3767a1f1-lib-modules\") pod \"calico-node-z8jt6\" (UID: \"c50ff685-6cab-4341-8171-30fd3767a1f1\") " pod="calico-system/calico-node-z8jt6" May 10 01:16:52.848646 kubelet[1991]: I0510 01:16:52.848609 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/c50ff685-6cab-4341-8171-30fd3767a1f1-cni-log-dir\") pod \"calico-node-z8jt6\" (UID: \"c50ff685-6cab-4341-8171-30fd3767a1f1\") " pod="calico-system/calico-node-z8jt6" May 10 01:16:52.848831 kubelet[1991]: I0510 01:16:52.848802 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c50ff685-6cab-4341-8171-30fd3767a1f1-tigera-ca-bundle\") pod \"calico-node-z8jt6\" (UID: \"c50ff685-6cab-4341-8171-30fd3767a1f1\") " pod="calico-system/calico-node-z8jt6" May 10 01:16:52.849013 kubelet[1991]: I0510 01:16:52.848974 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6zl98\" (UniqueName: \"kubernetes.io/projected/c50ff685-6cab-4341-8171-30fd3767a1f1-kube-api-access-6zl98\") pod \"calico-node-z8jt6\" (UID: \"c50ff685-6cab-4341-8171-30fd3767a1f1\") " pod="calico-system/calico-node-z8jt6" May 10 01:16:52.849161 kubelet[1991]: I0510 01:16:52.849125 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/c50ff685-6cab-4341-8171-30fd3767a1f1-cni-bin-dir\") pod \"calico-node-z8jt6\" (UID: \"c50ff685-6cab-4341-8171-30fd3767a1f1\") " pod="calico-system/calico-node-z8jt6" May 10 01:16:52.849308 kubelet[1991]: I0510 01:16:52.849281 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/c50ff685-6cab-4341-8171-30fd3767a1f1-cni-net-dir\") pod \"calico-node-z8jt6\" (UID: \"c50ff685-6cab-4341-8171-30fd3767a1f1\") " pod="calico-system/calico-node-z8jt6" May 10 01:16:52.849459 kubelet[1991]: I0510 01:16:52.849430 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/c50ff685-6cab-4341-8171-30fd3767a1f1-flexvol-driver-host\") pod \"calico-node-z8jt6\" (UID: \"c50ff685-6cab-4341-8171-30fd3767a1f1\") " pod="calico-system/calico-node-z8jt6" May 10 01:16:52.849646 kubelet[1991]: I0510 01:16:52.849618 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c50ff685-6cab-4341-8171-30fd3767a1f1-xtables-lock\") pod \"calico-node-z8jt6\" (UID: \"c50ff685-6cab-4341-8171-30fd3767a1f1\") " pod="calico-system/calico-node-z8jt6" May 10 01:16:52.849817 kubelet[1991]: I0510 01:16:52.849786 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/c50ff685-6cab-4341-8171-30fd3767a1f1-policysync\") pod \"calico-node-z8jt6\" (UID: \"c50ff685-6cab-4341-8171-30fd3767a1f1\") " pod="calico-system/calico-node-z8jt6" May 10 01:16:52.963594 kubelet[1991]: E0510 01:16:52.963524 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:52.963940 kubelet[1991]: W0510 01:16:52.963892 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:52.964277 kubelet[1991]: E0510 01:16:52.964244 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:52.964657 kubelet[1991]: E0510 01:16:52.964629 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:52.964657 kubelet[1991]: W0510 01:16:52.964654 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:52.964837 kubelet[1991]: E0510 01:16:52.964675 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:52.965009 kubelet[1991]: E0510 01:16:52.964974 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:52.965009 kubelet[1991]: W0510 01:16:52.964995 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:52.965149 kubelet[1991]: E0510 01:16:52.965011 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:52.967859 kubelet[1991]: E0510 01:16:52.967820 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:52.967859 kubelet[1991]: W0510 01:16:52.967844 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:52.968047 kubelet[1991]: E0510 01:16:52.967869 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:52.968351 kubelet[1991]: E0510 01:16:52.968278 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:52.968440 kubelet[1991]: W0510 01:16:52.968333 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:52.968551 kubelet[1991]: E0510 01:16:52.968522 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:52.970820 kubelet[1991]: E0510 01:16:52.970793 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:52.970820 kubelet[1991]: W0510 01:16:52.970814 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:52.971021 kubelet[1991]: E0510 01:16:52.970832 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:52.997683 kubelet[1991]: E0510 01:16:52.997578 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:52.997941 kubelet[1991]: W0510 01:16:52.997910 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:52.998127 kubelet[1991]: E0510 01:16:52.998099 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.022068 kubelet[1991]: E0510 01:16:53.021996 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xfs7c" podUID="828cc85f-6fb9-4e67-adff-af880ac7ed1f" May 10 01:16:53.048068 kubelet[1991]: E0510 01:16:53.048025 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.048337 kubelet[1991]: W0510 01:16:53.048306 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.048527 kubelet[1991]: E0510 01:16:53.048499 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.049083 kubelet[1991]: E0510 01:16:53.049061 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.049250 kubelet[1991]: W0510 01:16:53.049225 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.049411 kubelet[1991]: E0510 01:16:53.049386 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.050013 kubelet[1991]: E0510 01:16:53.049973 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.050151 kubelet[1991]: W0510 01:16:53.050127 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.050311 kubelet[1991]: E0510 01:16:53.050287 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.050736 kubelet[1991]: E0510 01:16:53.050701 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.050882 kubelet[1991]: W0510 01:16:53.050848 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.051038 kubelet[1991]: E0510 01:16:53.051014 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.051512 kubelet[1991]: E0510 01:16:53.051481 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.051669 kubelet[1991]: W0510 01:16:53.051644 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.051821 kubelet[1991]: E0510 01:16:53.051793 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.053619 kubelet[1991]: E0510 01:16:53.053595 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.053794 kubelet[1991]: W0510 01:16:53.053768 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.053950 kubelet[1991]: E0510 01:16:53.053924 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.054609 kubelet[1991]: E0510 01:16:53.054588 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.054767 kubelet[1991]: W0510 01:16:53.054741 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.054898 kubelet[1991]: E0510 01:16:53.054874 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.058493 kubelet[1991]: E0510 01:16:53.058462 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.058679 kubelet[1991]: W0510 01:16:53.058654 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.058853 kubelet[1991]: E0510 01:16:53.058826 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.060009 kubelet[1991]: E0510 01:16:53.059978 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.060153 kubelet[1991]: W0510 01:16:53.060128 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.060288 kubelet[1991]: E0510 01:16:53.060262 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.060671 kubelet[1991]: E0510 01:16:53.060649 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.060841 kubelet[1991]: W0510 01:16:53.060816 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.060988 kubelet[1991]: E0510 01:16:53.060950 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.061353 kubelet[1991]: E0510 01:16:53.061332 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.061795 kubelet[1991]: W0510 01:16:53.061475 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.061795 kubelet[1991]: E0510 01:16:53.061499 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.062098 kubelet[1991]: E0510 01:16:53.062077 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.062222 kubelet[1991]: W0510 01:16:53.062198 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.062353 kubelet[1991]: E0510 01:16:53.062328 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.062944 kubelet[1991]: E0510 01:16:53.062922 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.063115 kubelet[1991]: W0510 01:16:53.063091 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.063249 kubelet[1991]: E0510 01:16:53.063224 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.063613 kubelet[1991]: E0510 01:16:53.063591 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.064765 kubelet[1991]: W0510 01:16:53.064700 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.064915 kubelet[1991]: E0510 01:16:53.064889 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.065407 kubelet[1991]: E0510 01:16:53.065383 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.065534 kubelet[1991]: W0510 01:16:53.065510 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.065668 kubelet[1991]: E0510 01:16:53.065643 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.066074 kubelet[1991]: E0510 01:16:53.066053 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.066209 kubelet[1991]: W0510 01:16:53.066185 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.066352 kubelet[1991]: E0510 01:16:53.066327 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.066839 kubelet[1991]: E0510 01:16:53.066817 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.067022 kubelet[1991]: W0510 01:16:53.066995 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.067168 kubelet[1991]: E0510 01:16:53.067143 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.067610 kubelet[1991]: E0510 01:16:53.067583 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.067791 kubelet[1991]: W0510 01:16:53.067764 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.067929 kubelet[1991]: E0510 01:16:53.067904 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.068302 kubelet[1991]: E0510 01:16:53.068281 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.068418 kubelet[1991]: W0510 01:16:53.068394 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.068548 kubelet[1991]: E0510 01:16:53.068523 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.068927 kubelet[1991]: E0510 01:16:53.068907 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.069055 kubelet[1991]: W0510 01:16:53.069031 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.069203 kubelet[1991]: E0510 01:16:53.069179 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.069696 kubelet[1991]: E0510 01:16:53.069674 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.069881 kubelet[1991]: W0510 01:16:53.069857 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.070043 kubelet[1991]: E0510 01:16:53.070018 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.070217 kubelet[1991]: I0510 01:16:53.070181 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/828cc85f-6fb9-4e67-adff-af880ac7ed1f-registration-dir\") pod \"csi-node-driver-xfs7c\" (UID: \"828cc85f-6fb9-4e67-adff-af880ac7ed1f\") " pod="calico-system/csi-node-driver-xfs7c" May 10 01:16:53.070605 kubelet[1991]: E0510 01:16:53.070575 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.070756 kubelet[1991]: W0510 01:16:53.070695 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.070900 kubelet[1991]: E0510 01:16:53.070877 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.071261 kubelet[1991]: E0510 01:16:53.071239 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.071411 kubelet[1991]: W0510 01:16:53.071386 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.071547 kubelet[1991]: E0510 01:16:53.071524 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.071811 kubelet[1991]: I0510 01:16:53.071774 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/828cc85f-6fb9-4e67-adff-af880ac7ed1f-socket-dir\") pod \"csi-node-driver-xfs7c\" (UID: \"828cc85f-6fb9-4e67-adff-af880ac7ed1f\") " pod="calico-system/csi-node-driver-xfs7c" May 10 01:16:53.072104 kubelet[1991]: E0510 01:16:53.072083 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.072238 kubelet[1991]: W0510 01:16:53.072214 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.072385 kubelet[1991]: E0510 01:16:53.072344 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.072840 kubelet[1991]: E0510 01:16:53.072819 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.072977 kubelet[1991]: W0510 01:16:53.072939 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.073099 kubelet[1991]: E0510 01:16:53.073075 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.073471 kubelet[1991]: E0510 01:16:53.073414 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.073654 kubelet[1991]: W0510 01:16:53.073629 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.073838 kubelet[1991]: E0510 01:16:53.073815 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.074100 kubelet[1991]: I0510 01:16:53.074075 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/828cc85f-6fb9-4e67-adff-af880ac7ed1f-kubelet-dir\") pod \"csi-node-driver-xfs7c\" (UID: \"828cc85f-6fb9-4e67-adff-af880ac7ed1f\") " pod="calico-system/csi-node-driver-xfs7c" May 10 01:16:53.074373 kubelet[1991]: E0510 01:16:53.074353 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.074500 kubelet[1991]: W0510 01:16:53.074477 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.074643 kubelet[1991]: E0510 01:16:53.074618 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.077861 kubelet[1991]: E0510 01:16:53.077832 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.078027 kubelet[1991]: W0510 01:16:53.078000 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.078176 kubelet[1991]: E0510 01:16:53.078152 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.078602 kubelet[1991]: E0510 01:16:53.078579 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.078769 kubelet[1991]: W0510 01:16:53.078742 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.078907 kubelet[1991]: E0510 01:16:53.078881 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.079181 kubelet[1991]: I0510 01:16:53.079155 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wrt4f\" (UniqueName: \"kubernetes.io/projected/828cc85f-6fb9-4e67-adff-af880ac7ed1f-kube-api-access-wrt4f\") pod \"csi-node-driver-xfs7c\" (UID: \"828cc85f-6fb9-4e67-adff-af880ac7ed1f\") " pod="calico-system/csi-node-driver-xfs7c" May 10 01:16:53.079462 kubelet[1991]: E0510 01:16:53.079440 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.079586 kubelet[1991]: W0510 01:16:53.079561 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.079742 kubelet[1991]: E0510 01:16:53.079694 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.080192 kubelet[1991]: E0510 01:16:53.080171 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.080309 kubelet[1991]: W0510 01:16:53.080285 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.080457 kubelet[1991]: E0510 01:16:53.080434 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.083516 kubelet[1991]: E0510 01:16:53.083487 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.083700 kubelet[1991]: W0510 01:16:53.083655 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.083890 kubelet[1991]: E0510 01:16:53.083865 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.084177 kubelet[1991]: I0510 01:16:53.084147 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/828cc85f-6fb9-4e67-adff-af880ac7ed1f-varrun\") pod \"csi-node-driver-xfs7c\" (UID: \"828cc85f-6fb9-4e67-adff-af880ac7ed1f\") " pod="calico-system/csi-node-driver-xfs7c" May 10 01:16:53.084447 kubelet[1991]: E0510 01:16:53.084426 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.084569 kubelet[1991]: W0510 01:16:53.084544 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.084685 kubelet[1991]: E0510 01:16:53.084660 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.085206 kubelet[1991]: E0510 01:16:53.085185 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.085440 kubelet[1991]: W0510 01:16:53.085415 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.085564 kubelet[1991]: E0510 01:16:53.085540 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.086841 kubelet[1991]: E0510 01:16:53.086819 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.086977 kubelet[1991]: W0510 01:16:53.086938 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.087123 kubelet[1991]: E0510 01:16:53.087097 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.127159 env[1189]: time="2025-05-10T01:16:53.126362439Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-z8jt6,Uid:c50ff685-6cab-4341-8171-30fd3767a1f1,Namespace:calico-system,Attempt:0,}" May 10 01:16:53.160069 env[1189]: time="2025-05-10T01:16:53.159889137Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:16:53.160312 env[1189]: time="2025-05-10T01:16:53.160085124Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:16:53.160312 env[1189]: time="2025-05-10T01:16:53.160161031Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:16:53.164220 env[1189]: time="2025-05-10T01:16:53.160579379Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a6696fa928c9dd673d884cd963cbe53d3aa4a1d1dc48da66352083750e69f2e5 pid=2410 runtime=io.containerd.runc.v2 May 10 01:16:53.165578 env[1189]: time="2025-05-10T01:16:53.165520144Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-56484ccbdd-vmq9x,Uid:a2353b9d-fa50-49d3-b8e1-c3002146a949,Namespace:calico-system,Attempt:0,}" May 10 01:16:53.186865 kubelet[1991]: E0510 01:16:53.186575 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.186865 kubelet[1991]: W0510 01:16:53.186611 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.186865 kubelet[1991]: E0510 01:16:53.186641 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.187779 kubelet[1991]: E0510 01:16:53.187472 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.187779 kubelet[1991]: W0510 01:16:53.187491 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.187779 kubelet[1991]: E0510 01:16:53.187514 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.188469 kubelet[1991]: E0510 01:16:53.188259 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.188469 kubelet[1991]: W0510 01:16:53.188277 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.188469 kubelet[1991]: E0510 01:16:53.188300 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.189020 kubelet[1991]: E0510 01:16:53.188797 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.189020 kubelet[1991]: W0510 01:16:53.188815 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.189020 kubelet[1991]: E0510 01:16:53.188935 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.189481 kubelet[1991]: E0510 01:16:53.189288 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.189481 kubelet[1991]: W0510 01:16:53.189306 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.189481 kubelet[1991]: E0510 01:16:53.189438 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.190027 kubelet[1991]: E0510 01:16:53.189816 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.190027 kubelet[1991]: W0510 01:16:53.189833 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.190027 kubelet[1991]: E0510 01:16:53.189984 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.190500 kubelet[1991]: E0510 01:16:53.190302 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.190500 kubelet[1991]: W0510 01:16:53.190319 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.190500 kubelet[1991]: E0510 01:16:53.190449 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.191091 kubelet[1991]: E0510 01:16:53.190887 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.191091 kubelet[1991]: W0510 01:16:53.190906 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.191091 kubelet[1991]: E0510 01:16:53.191008 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.191848 kubelet[1991]: E0510 01:16:53.191826 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.192113 kubelet[1991]: W0510 01:16:53.192012 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.192285 kubelet[1991]: E0510 01:16:53.192227 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.193444 kubelet[1991]: E0510 01:16:53.193422 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.193563 kubelet[1991]: W0510 01:16:53.193537 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.193788 kubelet[1991]: E0510 01:16:53.193731 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.194375 kubelet[1991]: E0510 01:16:53.194353 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.194943 kubelet[1991]: W0510 01:16:53.194915 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.195884 kubelet[1991]: E0510 01:16:53.195861 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.196174 kubelet[1991]: W0510 01:16:53.196146 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.196534 kubelet[1991]: E0510 01:16:53.196512 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.196649 kubelet[1991]: W0510 01:16:53.196624 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.200560 kubelet[1991]: E0510 01:16:53.200528 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.203493 kubelet[1991]: W0510 01:16:53.203465 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.203890 kubelet[1991]: E0510 01:16:53.203420 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.204046 kubelet[1991]: E0510 01:16:53.203432 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.204180 kubelet[1991]: E0510 01:16:53.203406 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.204332 kubelet[1991]: E0510 01:16:53.204305 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.204674 kubelet[1991]: E0510 01:16:53.204651 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.206473 kubelet[1991]: W0510 01:16:53.206447 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.206658 kubelet[1991]: E0510 01:16:53.206631 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.207086 systemd[1]: Started cri-containerd-a6696fa928c9dd673d884cd963cbe53d3aa4a1d1dc48da66352083750e69f2e5.scope. May 10 01:16:53.207449 kubelet[1991]: E0510 01:16:53.207415 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.207580 kubelet[1991]: W0510 01:16:53.207555 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.207763 kubelet[1991]: E0510 01:16:53.207737 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.208224 kubelet[1991]: E0510 01:16:53.208202 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.213868 kubelet[1991]: W0510 01:16:53.213804 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.214166 kubelet[1991]: E0510 01:16:53.214138 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.216203 kubelet[1991]: E0510 01:16:53.216175 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.216203 kubelet[1991]: W0510 01:16:53.216201 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.216383 kubelet[1991]: E0510 01:16:53.216229 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.216512 kubelet[1991]: E0510 01:16:53.216488 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.216512 kubelet[1991]: W0510 01:16:53.216512 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.216658 kubelet[1991]: E0510 01:16:53.216529 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.216838 kubelet[1991]: E0510 01:16:53.216811 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.216838 kubelet[1991]: W0510 01:16:53.216832 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.217557 kubelet[1991]: E0510 01:16:53.217525 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.228090 kubelet[1991]: E0510 01:16:53.227892 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.228090 kubelet[1991]: W0510 01:16:53.227928 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.228369 kubelet[1991]: E0510 01:16:53.228270 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.228369 kubelet[1991]: W0510 01:16:53.228285 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.229589 kubelet[1991]: E0510 01:16:53.228541 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.229589 kubelet[1991]: E0510 01:16:53.228570 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.229589 kubelet[1991]: E0510 01:16:53.228560 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.229589 kubelet[1991]: W0510 01:16:53.228624 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.229589 kubelet[1991]: E0510 01:16:53.228641 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.229589 kubelet[1991]: E0510 01:16:53.229285 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.229589 kubelet[1991]: W0510 01:16:53.229300 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.229589 kubelet[1991]: E0510 01:16:53.229327 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.231513 kubelet[1991]: E0510 01:16:53.229662 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.231513 kubelet[1991]: W0510 01:16:53.229677 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.231513 kubelet[1991]: E0510 01:16:53.229693 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.243768 env[1189]: time="2025-05-10T01:16:53.241992353Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:16:53.243768 env[1189]: time="2025-05-10T01:16:53.242086582Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:16:53.243768 env[1189]: time="2025-05-10T01:16:53.242106930Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:16:53.243768 env[1189]: time="2025-05-10T01:16:53.242377701Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c16979322c196d7a76e56c6cd91ef9afa6e9fce6b7d9aa265ff311be85a2a3bc pid=2459 runtime=io.containerd.runc.v2 May 10 01:16:53.257766 kubelet[1991]: E0510 01:16:53.249298 1991 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:16:53.257766 kubelet[1991]: W0510 01:16:53.249340 1991 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:16:53.257766 kubelet[1991]: E0510 01:16:53.249370 1991 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:16:53.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.280000 audit: BPF prog-id=124 op=LOAD May 10 01:16:53.281000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2410 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:53.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136363936666139323863396464363733643838346364393633636265 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2410 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:53.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136363936666139323863396464363733643838346364393633636265 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit: BPF prog-id=125 op=LOAD May 10 01:16:53.281000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c8900 items=0 ppid=2410 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:53.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136363936666139323863396464363733643838346364393633636265 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit: BPF prog-id=126 op=LOAD May 10 01:16:53.281000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c8948 items=0 ppid=2410 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:53.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136363936666139323863396464363733643838346364393633636265 May 10 01:16:53.281000 audit: BPF prog-id=126 op=UNLOAD May 10 01:16:53.281000 audit: BPF prog-id=125 op=UNLOAD May 10 01:16:53.281000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.281000 audit: BPF prog-id=127 op=LOAD May 10 01:16:53.281000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c8d58 items=0 ppid=2410 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:53.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136363936666139323863396464363733643838346364393633636265 May 10 01:16:53.316513 systemd[1]: Started cri-containerd-c16979322c196d7a76e56c6cd91ef9afa6e9fce6b7d9aa265ff311be85a2a3bc.scope. May 10 01:16:53.353675 env[1189]: time="2025-05-10T01:16:53.353594401Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-z8jt6,Uid:c50ff685-6cab-4341-8171-30fd3767a1f1,Namespace:calico-system,Attempt:0,} returns sandbox id \"a6696fa928c9dd673d884cd963cbe53d3aa4a1d1dc48da66352083750e69f2e5\"" May 10 01:16:53.358214 env[1189]: time="2025-05-10T01:16:53.358167834Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 10 01:16:53.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.372000 audit: BPF prog-id=128 op=LOAD May 10 01:16:53.372000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.372000 audit[2473]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2459 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:53.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331363937393332326331393664376137366535366336636439316566 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2459 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:53.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331363937393332326331393664376137366535366336636439316566 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit: BPF prog-id=129 op=LOAD May 10 01:16:53.373000 audit[2473]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0002d86b0 items=0 ppid=2459 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:53.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331363937393332326331393664376137366535366336636439316566 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit: BPF prog-id=130 op=LOAD May 10 01:16:53.373000 audit[2473]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0002d86f8 items=0 ppid=2459 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:53.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331363937393332326331393664376137366535366336636439316566 May 10 01:16:53.373000 audit: BPF prog-id=130 op=UNLOAD May 10 01:16:53.373000 audit: BPF prog-id=129 op=UNLOAD May 10 01:16:53.373000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:53.373000 audit: BPF prog-id=131 op=LOAD May 10 01:16:53.373000 audit[2473]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0002d8b08 items=0 ppid=2459 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:53.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331363937393332326331393664376137366535366336636439316566 May 10 01:16:53.445325 env[1189]: time="2025-05-10T01:16:53.445263407Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-56484ccbdd-vmq9x,Uid:a2353b9d-fa50-49d3-b8e1-c3002146a949,Namespace:calico-system,Attempt:0,} returns sandbox id \"c16979322c196d7a76e56c6cd91ef9afa6e9fce6b7d9aa265ff311be85a2a3bc\"" May 10 01:16:53.556000 audit[2512]: NETFILTER_CFG table=filter:93 family=2 entries=18 op=nft_register_rule pid=2512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:16:53.556000 audit[2512]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffe9476c640 a2=0 a3=7ffe9476c62c items=0 ppid=2163 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:53.556000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:16:53.562000 audit[2512]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:16:53.562000 audit[2512]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe9476c640 a2=0 a3=0 items=0 ppid=2163 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:53.562000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:16:54.600639 kubelet[1991]: E0510 01:16:54.600507 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xfs7c" podUID="828cc85f-6fb9-4e67-adff-af880ac7ed1f" May 10 01:16:55.165514 env[1189]: time="2025-05-10T01:16:55.165426492Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:55.168314 env[1189]: time="2025-05-10T01:16:55.168275769Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:55.171753 env[1189]: time="2025-05-10T01:16:55.171687929Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:55.174836 env[1189]: time="2025-05-10T01:16:55.174792652Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:55.175731 env[1189]: time="2025-05-10T01:16:55.175671604Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 10 01:16:55.178704 env[1189]: time="2025-05-10T01:16:55.178550106Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 10 01:16:55.180297 env[1189]: time="2025-05-10T01:16:55.180253511Z" level=info msg="CreateContainer within sandbox \"a6696fa928c9dd673d884cd963cbe53d3aa4a1d1dc48da66352083750e69f2e5\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 01:16:55.208978 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3754386295.mount: Deactivated successfully. May 10 01:16:55.215393 env[1189]: time="2025-05-10T01:16:55.215324518Z" level=info msg="CreateContainer within sandbox \"a6696fa928c9dd673d884cd963cbe53d3aa4a1d1dc48da66352083750e69f2e5\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"7621843c0775feddf2bac59cea6a11ae44df9fc46bf172d1afe496357f31debf\"" May 10 01:16:55.219117 env[1189]: time="2025-05-10T01:16:55.219065570Z" level=info msg="StartContainer for \"7621843c0775feddf2bac59cea6a11ae44df9fc46bf172d1afe496357f31debf\"" May 10 01:16:55.264182 systemd[1]: Started cri-containerd-7621843c0775feddf2bac59cea6a11ae44df9fc46bf172d1afe496357f31debf.scope. May 10 01:16:55.272266 systemd[1]: run-containerd-runc-k8s.io-7621843c0775feddf2bac59cea6a11ae44df9fc46bf172d1afe496357f31debf-runc.FW8ztj.mount: Deactivated successfully. May 10 01:16:55.314000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.314000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa8a05f0568 items=0 ppid=2410 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:55.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736323138343363303737356665646466326261633539636561366131 May 10 01:16:55.314000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.314000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.314000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.314000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.314000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.314000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.314000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.314000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.314000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.314000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.314000 audit: BPF prog-id=132 op=LOAD May 10 01:16:55.314000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000232208 items=0 ppid=2410 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:55.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736323138343363303737356665646466326261633539636561366131 May 10 01:16:55.317000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.317000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.317000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.317000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.317000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.317000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.317000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.317000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.317000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.317000 audit: BPF prog-id=133 op=LOAD May 10 01:16:55.317000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000232258 items=0 ppid=2410 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:55.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736323138343363303737356665646466326261633539636561366131 May 10 01:16:55.318000 audit: BPF prog-id=133 op=UNLOAD May 10 01:16:55.318000 audit: BPF prog-id=132 op=UNLOAD May 10 01:16:55.319000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.319000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.319000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.319000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.319000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.319000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.319000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.319000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.319000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.319000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:55.319000 audit: BPF prog-id=134 op=LOAD May 10 01:16:55.319000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002322e8 items=0 ppid=2410 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:55.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736323138343363303737356665646466326261633539636561366131 May 10 01:16:55.349950 env[1189]: time="2025-05-10T01:16:55.349878133Z" level=info msg="StartContainer for \"7621843c0775feddf2bac59cea6a11ae44df9fc46bf172d1afe496357f31debf\" returns successfully" May 10 01:16:55.377126 systemd[1]: cri-containerd-7621843c0775feddf2bac59cea6a11ae44df9fc46bf172d1afe496357f31debf.scope: Deactivated successfully. May 10 01:16:55.379000 audit: BPF prog-id=134 op=UNLOAD May 10 01:16:55.473182 env[1189]: time="2025-05-10T01:16:55.469543206Z" level=info msg="shim disconnected" id=7621843c0775feddf2bac59cea6a11ae44df9fc46bf172d1afe496357f31debf May 10 01:16:55.473182 env[1189]: time="2025-05-10T01:16:55.469635291Z" level=warning msg="cleaning up after shim disconnected" id=7621843c0775feddf2bac59cea6a11ae44df9fc46bf172d1afe496357f31debf namespace=k8s.io May 10 01:16:55.473182 env[1189]: time="2025-05-10T01:16:55.469654365Z" level=info msg="cleaning up dead shim" May 10 01:16:55.484676 env[1189]: time="2025-05-10T01:16:55.484608763Z" level=warning msg="cleanup warnings time=\"2025-05-10T01:16:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2563 runtime=io.containerd.runc.v2\n" May 10 01:16:56.204342 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7621843c0775feddf2bac59cea6a11ae44df9fc46bf172d1afe496357f31debf-rootfs.mount: Deactivated successfully. May 10 01:16:56.601557 kubelet[1991]: E0510 01:16:56.601474 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xfs7c" podUID="828cc85f-6fb9-4e67-adff-af880ac7ed1f" May 10 01:16:58.546075 env[1189]: time="2025-05-10T01:16:58.545955022Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:58.550210 env[1189]: time="2025-05-10T01:16:58.550151519Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:58.554726 env[1189]: time="2025-05-10T01:16:58.554642483Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:58.557836 env[1189]: time="2025-05-10T01:16:58.557765812Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:16:58.558946 env[1189]: time="2025-05-10T01:16:58.558774982Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 10 01:16:58.565306 env[1189]: time="2025-05-10T01:16:58.565244505Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 10 01:16:58.593457 env[1189]: time="2025-05-10T01:16:58.593389276Z" level=info msg="CreateContainer within sandbox \"c16979322c196d7a76e56c6cd91ef9afa6e9fce6b7d9aa265ff311be85a2a3bc\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 10 01:16:58.602969 kubelet[1991]: E0510 01:16:58.602777 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xfs7c" podUID="828cc85f-6fb9-4e67-adff-af880ac7ed1f" May 10 01:16:58.612133 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2964089796.mount: Deactivated successfully. May 10 01:16:58.621266 env[1189]: time="2025-05-10T01:16:58.621171038Z" level=info msg="CreateContainer within sandbox \"c16979322c196d7a76e56c6cd91ef9afa6e9fce6b7d9aa265ff311be85a2a3bc\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"3635883046aa2dbc526490e8ee529e133a4645c061cfbd8f402f3919c64a11e0\"" May 10 01:16:58.624209 env[1189]: time="2025-05-10T01:16:58.622250540Z" level=info msg="StartContainer for \"3635883046aa2dbc526490e8ee529e133a4645c061cfbd8f402f3919c64a11e0\"" May 10 01:16:58.692310 systemd[1]: Started cri-containerd-3635883046aa2dbc526490e8ee529e133a4645c061cfbd8f402f3919c64a11e0.scope. May 10 01:16:58.724314 kernel: kauditd_printk_skb: 166 callbacks suppressed May 10 01:16:58.724568 kernel: audit: type=1400 audit(1746839818.715:1006): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.724662 kernel: audit: type=1400 audit(1746839818.715:1007): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.734316 kernel: audit: type=1400 audit(1746839818.715:1008): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.734478 kernel: audit: type=1400 audit(1746839818.715:1009): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.750378 kernel: audit: type=1400 audit(1746839818.715:1010): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.750566 kernel: audit: type=1400 audit(1746839818.715:1011): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.760551 kernel: audit: type=1400 audit(1746839818.715:1012): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.766828 kernel: audit: type=1400 audit(1746839818.715:1013): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.779568 kernel: audit: type=1400 audit(1746839818.715:1014): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.779807 kernel: audit: type=1400 audit(1746839818.728:1015): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.728000 audit: BPF prog-id=135 op=LOAD May 10 01:16:58.733000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.733000 audit[2589]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2459 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:58.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336333538383330343661613264626335323634393065386565353239 May 10 01:16:58.733000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.733000 audit[2589]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2459 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:58.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336333538383330343661613264626335323634393065386565353239 May 10 01:16:58.733000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.733000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.733000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.733000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.733000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.733000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.733000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.733000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.733000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.733000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.733000 audit: BPF prog-id=136 op=LOAD May 10 01:16:58.733000 audit[2589]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ca650 items=0 ppid=2459 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:58.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336333538383330343661613264626335323634393065386565353239 May 10 01:16:58.749000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.749000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.749000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.749000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.749000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.749000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.749000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.749000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.749000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.749000 audit: BPF prog-id=137 op=LOAD May 10 01:16:58.749000 audit[2589]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ca698 items=0 ppid=2459 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:58.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336333538383330343661613264626335323634393065386565353239 May 10 01:16:58.749000 audit: BPF prog-id=137 op=UNLOAD May 10 01:16:58.750000 audit: BPF prog-id=136 op=UNLOAD May 10 01:16:58.750000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.750000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.750000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.750000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.750000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.750000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.750000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.750000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.750000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.750000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:16:58.750000 audit: BPF prog-id=138 op=LOAD May 10 01:16:58.750000 audit[2589]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003caaa8 items=0 ppid=2459 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:16:58.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336333538383330343661613264626335323634393065386565353239 May 10 01:16:58.850184 env[1189]: time="2025-05-10T01:16:58.849991188Z" level=info msg="StartContainer for \"3635883046aa2dbc526490e8ee529e133a4645c061cfbd8f402f3919c64a11e0\" returns successfully" May 10 01:16:59.738610 kubelet[1991]: I0510 01:16:59.738475 1991 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-56484ccbdd-vmq9x" podStartSLOduration=2.629758917 podStartE2EDuration="7.738411466s" podCreationTimestamp="2025-05-10 01:16:52 +0000 UTC" firstStartedPulling="2025-05-10 01:16:53.45244977 +0000 UTC m=+14.192154832" lastFinishedPulling="2025-05-10 01:16:58.561102313 +0000 UTC m=+19.300807381" observedRunningTime="2025-05-10 01:16:59.735005675 +0000 UTC m=+20.474710757" watchObservedRunningTime="2025-05-10 01:16:59.738411466 +0000 UTC m=+20.478116553" May 10 01:17:00.601383 kubelet[1991]: E0510 01:17:00.600759 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xfs7c" podUID="828cc85f-6fb9-4e67-adff-af880ac7ed1f" May 10 01:17:00.721494 kubelet[1991]: I0510 01:17:00.720941 1991 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 01:17:02.601363 kubelet[1991]: E0510 01:17:02.601176 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xfs7c" podUID="828cc85f-6fb9-4e67-adff-af880ac7ed1f" May 10 01:17:04.602658 kubelet[1991]: E0510 01:17:04.602510 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xfs7c" podUID="828cc85f-6fb9-4e67-adff-af880ac7ed1f" May 10 01:17:06.261770 env[1189]: time="2025-05-10T01:17:06.261564503Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:06.282038 env[1189]: time="2025-05-10T01:17:06.281972681Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:06.284328 env[1189]: time="2025-05-10T01:17:06.284287304Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:06.290490 env[1189]: time="2025-05-10T01:17:06.290424905Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:06.291346 env[1189]: time="2025-05-10T01:17:06.291290824Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 10 01:17:06.297688 env[1189]: time="2025-05-10T01:17:06.297636313Z" level=info msg="CreateContainer within sandbox \"a6696fa928c9dd673d884cd963cbe53d3aa4a1d1dc48da66352083750e69f2e5\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 01:17:06.321385 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount506973201.mount: Deactivated successfully. May 10 01:17:06.325972 env[1189]: time="2025-05-10T01:17:06.325916922Z" level=info msg="CreateContainer within sandbox \"a6696fa928c9dd673d884cd963cbe53d3aa4a1d1dc48da66352083750e69f2e5\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"9f19223a1f942972e881feeffdc555499d979298138c883fb7148ffda3f5e9ea\"" May 10 01:17:06.329430 env[1189]: time="2025-05-10T01:17:06.329390041Z" level=info msg="StartContainer for \"9f19223a1f942972e881feeffdc555499d979298138c883fb7148ffda3f5e9ea\"" May 10 01:17:06.388487 systemd[1]: Started cri-containerd-9f19223a1f942972e881feeffdc555499d979298138c883fb7148ffda3f5e9ea.scope. May 10 01:17:06.436606 kernel: kauditd_printk_skb: 47 callbacks suppressed May 10 01:17:06.436932 kernel: audit: type=1400 audit(1746839826.424:1024): avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.424000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.424000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f4e7c064608 items=0 ppid=2410 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:06.458119 kernel: audit: type=1300 audit(1746839826.424:1024): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f4e7c064608 items=0 ppid=2410 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:06.458316 kernel: audit: type=1327 audit(1746839826.424:1024): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966313932323361316639343239373265383831666565666664633535 May 10 01:17:06.458383 kernel: audit: type=1400 audit(1746839826.429:1025): avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.458445 kernel: audit: type=1400 audit(1746839826.429:1025): avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966313932323361316639343239373265383831666565666664633535 May 10 01:17:06.429000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.429000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.429000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.468426 kernel: audit: type=1400 audit(1746839826.429:1025): avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.429000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.475830 kernel: audit: type=1400 audit(1746839826.429:1025): avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.483361 kernel: audit: type=1400 audit(1746839826.429:1025): avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.429000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.429000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.429000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.494334 kernel: audit: type=1400 audit(1746839826.429:1025): avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.494466 kernel: audit: type=1400 audit(1746839826.429:1025): avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.429000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.429000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.429000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.429000 audit: BPF prog-id=139 op=LOAD May 10 01:17:06.429000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002a8858 items=0 ppid=2410 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:06.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966313932323361316639343239373265383831666565666664633535 May 10 01:17:06.429000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.429000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.429000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.429000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.429000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.429000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.429000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.429000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.429000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.429000 audit: BPF prog-id=140 op=LOAD May 10 01:17:06.429000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002a88a8 items=0 ppid=2410 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:06.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966313932323361316639343239373265383831666565666664633535 May 10 01:17:06.434000 audit: BPF prog-id=140 op=UNLOAD May 10 01:17:06.435000 audit: BPF prog-id=139 op=UNLOAD May 10 01:17:06.435000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.435000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.435000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.435000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.435000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.435000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.435000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.435000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.435000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.435000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:06.435000 audit: BPF prog-id=141 op=LOAD May 10 01:17:06.435000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002a8938 items=0 ppid=2410 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:06.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966313932323361316639343239373265383831666565666664633535 May 10 01:17:06.504269 env[1189]: time="2025-05-10T01:17:06.504205670Z" level=info msg="StartContainer for \"9f19223a1f942972e881feeffdc555499d979298138c883fb7148ffda3f5e9ea\" returns successfully" May 10 01:17:06.600971 kubelet[1991]: E0510 01:17:06.600815 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xfs7c" podUID="828cc85f-6fb9-4e67-adff-af880ac7ed1f" May 10 01:17:07.316935 systemd[1]: run-containerd-runc-k8s.io-9f19223a1f942972e881feeffdc555499d979298138c883fb7148ffda3f5e9ea-runc.y46gSK.mount: Deactivated successfully. May 10 01:17:07.612372 env[1189]: time="2025-05-10T01:17:07.612180216Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 01:17:07.616276 systemd[1]: cri-containerd-9f19223a1f942972e881feeffdc555499d979298138c883fb7148ffda3f5e9ea.scope: Deactivated successfully. May 10 01:17:07.621000 audit: BPF prog-id=141 op=UNLOAD May 10 01:17:07.644747 kubelet[1991]: I0510 01:17:07.643837 1991 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 10 01:17:07.661402 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9f19223a1f942972e881feeffdc555499d979298138c883fb7148ffda3f5e9ea-rootfs.mount: Deactivated successfully. May 10 01:17:07.676335 env[1189]: time="2025-05-10T01:17:07.676268581Z" level=info msg="shim disconnected" id=9f19223a1f942972e881feeffdc555499d979298138c883fb7148ffda3f5e9ea May 10 01:17:07.676704 env[1189]: time="2025-05-10T01:17:07.676649050Z" level=warning msg="cleaning up after shim disconnected" id=9f19223a1f942972e881feeffdc555499d979298138c883fb7148ffda3f5e9ea namespace=k8s.io May 10 01:17:07.676925 env[1189]: time="2025-05-10T01:17:07.676894611Z" level=info msg="cleaning up dead shim" May 10 01:17:07.694905 env[1189]: time="2025-05-10T01:17:07.694833039Z" level=warning msg="cleanup warnings time=\"2025-05-10T01:17:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2671 runtime=io.containerd.runc.v2\n" May 10 01:17:07.749121 systemd[1]: Created slice kubepods-burstable-poda8202034_330d_4ba1_b2a5_d033aec45ae4.slice. May 10 01:17:07.763960 systemd[1]: Created slice kubepods-burstable-pod58e5027b_f4ac_4e2f_b07f_7833816a6c67.slice. May 10 01:17:07.764581 env[1189]: time="2025-05-10T01:17:07.764491026Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 10 01:17:07.778486 systemd[1]: Created slice kubepods-besteffort-pod3b8a75fb_e300_4c19_b234_964ddae047ca.slice. May 10 01:17:07.795012 systemd[1]: Created slice kubepods-besteffort-podd62fc1e5_8a86_41aa_9230_dba166d93b57.slice. May 10 01:17:07.803838 systemd[1]: Created slice kubepods-besteffort-pod4d3687fd_fc69_446e_87a9_b2f0538e94b3.slice. May 10 01:17:07.827626 kubelet[1991]: I0510 01:17:07.827562 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d62fc1e5-8a86-41aa-9230-dba166d93b57-calico-apiserver-certs\") pod \"calico-apiserver-778fbb4795-597wd\" (UID: \"d62fc1e5-8a86-41aa-9230-dba166d93b57\") " pod="calico-apiserver/calico-apiserver-778fbb4795-597wd" May 10 01:17:07.828424 kubelet[1991]: I0510 01:17:07.828392 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f8j59\" (UniqueName: \"kubernetes.io/projected/4d3687fd-fc69-446e-87a9-b2f0538e94b3-kube-api-access-f8j59\") pod \"calico-apiserver-778fbb4795-znbw9\" (UID: \"4d3687fd-fc69-446e-87a9-b2f0538e94b3\") " pod="calico-apiserver/calico-apiserver-778fbb4795-znbw9" May 10 01:17:07.828635 kubelet[1991]: I0510 01:17:07.828589 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cw555\" (UniqueName: \"kubernetes.io/projected/3b8a75fb-e300-4c19-b234-964ddae047ca-kube-api-access-cw555\") pod \"calico-kube-controllers-5bbd7d95bb-vwbw7\" (UID: \"3b8a75fb-e300-4c19-b234-964ddae047ca\") " pod="calico-system/calico-kube-controllers-5bbd7d95bb-vwbw7" May 10 01:17:07.829650 kubelet[1991]: I0510 01:17:07.829619 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qd9tp\" (UniqueName: \"kubernetes.io/projected/d62fc1e5-8a86-41aa-9230-dba166d93b57-kube-api-access-qd9tp\") pod \"calico-apiserver-778fbb4795-597wd\" (UID: \"d62fc1e5-8a86-41aa-9230-dba166d93b57\") " pod="calico-apiserver/calico-apiserver-778fbb4795-597wd" May 10 01:17:07.829952 kubelet[1991]: I0510 01:17:07.829921 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/58e5027b-f4ac-4e2f-b07f-7833816a6c67-config-volume\") pod \"coredns-6f6b679f8f-vhkxk\" (UID: \"58e5027b-f4ac-4e2f-b07f-7833816a6c67\") " pod="kube-system/coredns-6f6b679f8f-vhkxk" May 10 01:17:07.830134 kubelet[1991]: I0510 01:17:07.830105 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b2xl6\" (UniqueName: \"kubernetes.io/projected/a8202034-330d-4ba1-b2a5-d033aec45ae4-kube-api-access-b2xl6\") pod \"coredns-6f6b679f8f-gzcsf\" (UID: \"a8202034-330d-4ba1-b2a5-d033aec45ae4\") " pod="kube-system/coredns-6f6b679f8f-gzcsf" May 10 01:17:07.830305 kubelet[1991]: I0510 01:17:07.830277 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/4d3687fd-fc69-446e-87a9-b2f0538e94b3-calico-apiserver-certs\") pod \"calico-apiserver-778fbb4795-znbw9\" (UID: \"4d3687fd-fc69-446e-87a9-b2f0538e94b3\") " pod="calico-apiserver/calico-apiserver-778fbb4795-znbw9" May 10 01:17:07.830472 kubelet[1991]: I0510 01:17:07.830443 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gnndg\" (UniqueName: \"kubernetes.io/projected/58e5027b-f4ac-4e2f-b07f-7833816a6c67-kube-api-access-gnndg\") pod \"coredns-6f6b679f8f-vhkxk\" (UID: \"58e5027b-f4ac-4e2f-b07f-7833816a6c67\") " pod="kube-system/coredns-6f6b679f8f-vhkxk" May 10 01:17:07.830777 kubelet[1991]: I0510 01:17:07.830742 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3b8a75fb-e300-4c19-b234-964ddae047ca-tigera-ca-bundle\") pod \"calico-kube-controllers-5bbd7d95bb-vwbw7\" (UID: \"3b8a75fb-e300-4c19-b234-964ddae047ca\") " pod="calico-system/calico-kube-controllers-5bbd7d95bb-vwbw7" May 10 01:17:07.830953 kubelet[1991]: I0510 01:17:07.830925 1991 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/a8202034-330d-4ba1-b2a5-d033aec45ae4-config-volume\") pod \"coredns-6f6b679f8f-gzcsf\" (UID: \"a8202034-330d-4ba1-b2a5-d033aec45ae4\") " pod="kube-system/coredns-6f6b679f8f-gzcsf" May 10 01:17:08.058931 env[1189]: time="2025-05-10T01:17:08.058260801Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-gzcsf,Uid:a8202034-330d-4ba1-b2a5-d033aec45ae4,Namespace:kube-system,Attempt:0,}" May 10 01:17:08.074341 env[1189]: time="2025-05-10T01:17:08.074241655Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-vhkxk,Uid:58e5027b-f4ac-4e2f-b07f-7833816a6c67,Namespace:kube-system,Attempt:0,}" May 10 01:17:08.093954 env[1189]: time="2025-05-10T01:17:08.093876994Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5bbd7d95bb-vwbw7,Uid:3b8a75fb-e300-4c19-b234-964ddae047ca,Namespace:calico-system,Attempt:0,}" May 10 01:17:08.101503 env[1189]: time="2025-05-10T01:17:08.101445022Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-778fbb4795-597wd,Uid:d62fc1e5-8a86-41aa-9230-dba166d93b57,Namespace:calico-apiserver,Attempt:0,}" May 10 01:17:08.108841 env[1189]: time="2025-05-10T01:17:08.108779415Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-778fbb4795-znbw9,Uid:4d3687fd-fc69-446e-87a9-b2f0538e94b3,Namespace:calico-apiserver,Attempt:0,}" May 10 01:17:08.532885 env[1189]: time="2025-05-10T01:17:08.532776077Z" level=error msg="Failed to destroy network for sandbox \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.538379 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe-shm.mount: Deactivated successfully. May 10 01:17:08.541979 env[1189]: time="2025-05-10T01:17:08.541905743Z" level=error msg="encountered an error cleaning up failed sandbox \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.545393 env[1189]: time="2025-05-10T01:17:08.545324728Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-gzcsf,Uid:a8202034-330d-4ba1-b2a5-d033aec45ae4,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.548642 kubelet[1991]: E0510 01:17:08.547976 1991 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.548642 kubelet[1991]: E0510 01:17:08.548134 1991 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-gzcsf" May 10 01:17:08.548642 kubelet[1991]: E0510 01:17:08.548180 1991 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-gzcsf" May 10 01:17:08.549103 kubelet[1991]: E0510 01:17:08.548271 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-gzcsf_kube-system(a8202034-330d-4ba1-b2a5-d033aec45ae4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-gzcsf_kube-system(a8202034-330d-4ba1-b2a5-d033aec45ae4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-gzcsf" podUID="a8202034-330d-4ba1-b2a5-d033aec45ae4" May 10 01:17:08.549905 env[1189]: time="2025-05-10T01:17:08.549847587Z" level=error msg="Failed to destroy network for sandbox \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.553055 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9-shm.mount: Deactivated successfully. May 10 01:17:08.558989 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb-shm.mount: Deactivated successfully. May 10 01:17:08.560216 kubelet[1991]: E0510 01:17:08.555155 1991 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.560216 kubelet[1991]: E0510 01:17:08.555236 1991 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5bbd7d95bb-vwbw7" May 10 01:17:08.560216 kubelet[1991]: E0510 01:17:08.555266 1991 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5bbd7d95bb-vwbw7" May 10 01:17:08.560443 env[1189]: time="2025-05-10T01:17:08.554790039Z" level=error msg="encountered an error cleaning up failed sandbox \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.560443 env[1189]: time="2025-05-10T01:17:08.554884696Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5bbd7d95bb-vwbw7,Uid:3b8a75fb-e300-4c19-b234-964ddae047ca,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.560443 env[1189]: time="2025-05-10T01:17:08.556011643Z" level=error msg="Failed to destroy network for sandbox \"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.560749 kubelet[1991]: E0510 01:17:08.555366 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5bbd7d95bb-vwbw7_calico-system(3b8a75fb-e300-4c19-b234-964ddae047ca)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5bbd7d95bb-vwbw7_calico-system(3b8a75fb-e300-4c19-b234-964ddae047ca)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5bbd7d95bb-vwbw7" podUID="3b8a75fb-e300-4c19-b234-964ddae047ca" May 10 01:17:08.561085 env[1189]: time="2025-05-10T01:17:08.561016917Z" level=error msg="encountered an error cleaning up failed sandbox \"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.561272 env[1189]: time="2025-05-10T01:17:08.561224116Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-vhkxk,Uid:58e5027b-f4ac-4e2f-b07f-7833816a6c67,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.564842 kubelet[1991]: E0510 01:17:08.561624 1991 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.564842 kubelet[1991]: E0510 01:17:08.561704 1991 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-vhkxk" May 10 01:17:08.564842 kubelet[1991]: E0510 01:17:08.561775 1991 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-vhkxk" May 10 01:17:08.565256 kubelet[1991]: E0510 01:17:08.561872 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-vhkxk_kube-system(58e5027b-f4ac-4e2f-b07f-7833816a6c67)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-vhkxk_kube-system(58e5027b-f4ac-4e2f-b07f-7833816a6c67)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-vhkxk" podUID="58e5027b-f4ac-4e2f-b07f-7833816a6c67" May 10 01:17:08.571247 env[1189]: time="2025-05-10T01:17:08.571149577Z" level=error msg="Failed to destroy network for sandbox \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.577490 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d-shm.mount: Deactivated successfully. May 10 01:17:08.582594 env[1189]: time="2025-05-10T01:17:08.582508651Z" level=error msg="encountered an error cleaning up failed sandbox \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.585213 env[1189]: time="2025-05-10T01:17:08.584325516Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-778fbb4795-597wd,Uid:d62fc1e5-8a86-41aa-9230-dba166d93b57,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.585995 kubelet[1991]: E0510 01:17:08.585490 1991 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.585995 kubelet[1991]: E0510 01:17:08.585564 1991 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-778fbb4795-597wd" May 10 01:17:08.585995 kubelet[1991]: E0510 01:17:08.585593 1991 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-778fbb4795-597wd" May 10 01:17:08.586202 kubelet[1991]: E0510 01:17:08.585691 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-778fbb4795-597wd_calico-apiserver(d62fc1e5-8a86-41aa-9230-dba166d93b57)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-778fbb4795-597wd_calico-apiserver(d62fc1e5-8a86-41aa-9230-dba166d93b57)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-778fbb4795-597wd" podUID="d62fc1e5-8a86-41aa-9230-dba166d93b57" May 10 01:17:08.591544 env[1189]: time="2025-05-10T01:17:08.591414022Z" level=error msg="Failed to destroy network for sandbox \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.592295 env[1189]: time="2025-05-10T01:17:08.592205345Z" level=error msg="encountered an error cleaning up failed sandbox \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.592412 env[1189]: time="2025-05-10T01:17:08.592292409Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-778fbb4795-znbw9,Uid:4d3687fd-fc69-446e-87a9-b2f0538e94b3,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.592613 kubelet[1991]: E0510 01:17:08.592557 1991 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.592754 kubelet[1991]: E0510 01:17:08.592644 1991 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-778fbb4795-znbw9" May 10 01:17:08.592754 kubelet[1991]: E0510 01:17:08.592721 1991 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-778fbb4795-znbw9" May 10 01:17:08.592935 kubelet[1991]: E0510 01:17:08.592872 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-778fbb4795-znbw9_calico-apiserver(4d3687fd-fc69-446e-87a9-b2f0538e94b3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-778fbb4795-znbw9_calico-apiserver(4d3687fd-fc69-446e-87a9-b2f0538e94b3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-778fbb4795-znbw9" podUID="4d3687fd-fc69-446e-87a9-b2f0538e94b3" May 10 01:17:08.615230 systemd[1]: Created slice kubepods-besteffort-pod828cc85f_6fb9_4e67_adff_af880ac7ed1f.slice. May 10 01:17:08.619570 env[1189]: time="2025-05-10T01:17:08.619513988Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xfs7c,Uid:828cc85f-6fb9-4e67-adff-af880ac7ed1f,Namespace:calico-system,Attempt:0,}" May 10 01:17:08.706609 env[1189]: time="2025-05-10T01:17:08.706503878Z" level=error msg="Failed to destroy network for sandbox \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.707075 env[1189]: time="2025-05-10T01:17:08.707028693Z" level=error msg="encountered an error cleaning up failed sandbox \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.707189 env[1189]: time="2025-05-10T01:17:08.707100928Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xfs7c,Uid:828cc85f-6fb9-4e67-adff-af880ac7ed1f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.710249 kubelet[1991]: E0510 01:17:08.707528 1991 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.710249 kubelet[1991]: E0510 01:17:08.707637 1991 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xfs7c" May 10 01:17:08.710249 kubelet[1991]: E0510 01:17:08.707698 1991 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xfs7c" May 10 01:17:08.711112 kubelet[1991]: E0510 01:17:08.710170 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xfs7c_calico-system(828cc85f-6fb9-4e67-adff-af880ac7ed1f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xfs7c_calico-system(828cc85f-6fb9-4e67-adff-af880ac7ed1f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xfs7c" podUID="828cc85f-6fb9-4e67-adff-af880ac7ed1f" May 10 01:17:08.764695 kubelet[1991]: I0510 01:17:08.764538 1991 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" May 10 01:17:08.767900 kubelet[1991]: I0510 01:17:08.766664 1991 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" May 10 01:17:08.775336 env[1189]: time="2025-05-10T01:17:08.773582226Z" level=info msg="StopPodSandbox for \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\"" May 10 01:17:08.776072 env[1189]: time="2025-05-10T01:17:08.776032771Z" level=info msg="StopPodSandbox for \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\"" May 10 01:17:08.789784 kubelet[1991]: I0510 01:17:08.786375 1991 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" May 10 01:17:08.797783 env[1189]: time="2025-05-10T01:17:08.797031753Z" level=info msg="StopPodSandbox for \"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\"" May 10 01:17:08.798854 kubelet[1991]: I0510 01:17:08.798822 1991 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" May 10 01:17:08.801344 env[1189]: time="2025-05-10T01:17:08.801290918Z" level=info msg="StopPodSandbox for \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\"" May 10 01:17:08.803496 kubelet[1991]: I0510 01:17:08.803037 1991 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" May 10 01:17:08.805021 env[1189]: time="2025-05-10T01:17:08.804943053Z" level=info msg="StopPodSandbox for \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\"" May 10 01:17:08.807756 kubelet[1991]: I0510 01:17:08.807146 1991 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" May 10 01:17:08.810507 env[1189]: time="2025-05-10T01:17:08.810448963Z" level=info msg="StopPodSandbox for \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\"" May 10 01:17:08.907966 env[1189]: time="2025-05-10T01:17:08.907876275Z" level=error msg="StopPodSandbox for \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\" failed" error="failed to destroy network for sandbox \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.908516 kubelet[1991]: E0510 01:17:08.908448 1991 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" May 10 01:17:08.908632 kubelet[1991]: E0510 01:17:08.908544 1991 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d"} May 10 01:17:08.908789 kubelet[1991]: E0510 01:17:08.908745 1991 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d62fc1e5-8a86-41aa-9230-dba166d93b57\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:17:08.908994 kubelet[1991]: E0510 01:17:08.908812 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d62fc1e5-8a86-41aa-9230-dba166d93b57\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-778fbb4795-597wd" podUID="d62fc1e5-8a86-41aa-9230-dba166d93b57" May 10 01:17:08.911914 env[1189]: time="2025-05-10T01:17:08.911857225Z" level=error msg="StopPodSandbox for \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\" failed" error="failed to destroy network for sandbox \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.912354 kubelet[1991]: E0510 01:17:08.912293 1991 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" May 10 01:17:08.912467 kubelet[1991]: E0510 01:17:08.912351 1991 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9"} May 10 01:17:08.912467 kubelet[1991]: E0510 01:17:08.912399 1991 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3b8a75fb-e300-4c19-b234-964ddae047ca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:17:08.912467 kubelet[1991]: E0510 01:17:08.912432 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3b8a75fb-e300-4c19-b234-964ddae047ca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5bbd7d95bb-vwbw7" podUID="3b8a75fb-e300-4c19-b234-964ddae047ca" May 10 01:17:08.958490 env[1189]: time="2025-05-10T01:17:08.958404557Z" level=error msg="StopPodSandbox for \"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\" failed" error="failed to destroy network for sandbox \"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.959149 kubelet[1991]: E0510 01:17:08.959090 1991 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" May 10 01:17:08.959310 kubelet[1991]: E0510 01:17:08.959169 1991 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb"} May 10 01:17:08.959310 kubelet[1991]: E0510 01:17:08.959243 1991 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"58e5027b-f4ac-4e2f-b07f-7833816a6c67\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:17:08.959310 kubelet[1991]: E0510 01:17:08.959281 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"58e5027b-f4ac-4e2f-b07f-7833816a6c67\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-vhkxk" podUID="58e5027b-f4ac-4e2f-b07f-7833816a6c67" May 10 01:17:08.976143 env[1189]: time="2025-05-10T01:17:08.976050329Z" level=error msg="StopPodSandbox for \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\" failed" error="failed to destroy network for sandbox \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.976686 kubelet[1991]: E0510 01:17:08.976594 1991 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" May 10 01:17:08.976856 kubelet[1991]: E0510 01:17:08.976693 1991 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356"} May 10 01:17:08.976856 kubelet[1991]: E0510 01:17:08.976768 1991 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4d3687fd-fc69-446e-87a9-b2f0538e94b3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:17:08.976856 kubelet[1991]: E0510 01:17:08.976803 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4d3687fd-fc69-446e-87a9-b2f0538e94b3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-778fbb4795-znbw9" podUID="4d3687fd-fc69-446e-87a9-b2f0538e94b3" May 10 01:17:08.990571 env[1189]: time="2025-05-10T01:17:08.990484530Z" level=error msg="StopPodSandbox for \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\" failed" error="failed to destroy network for sandbox \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.994747 kubelet[1991]: E0510 01:17:08.993462 1991 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" May 10 01:17:08.994747 kubelet[1991]: E0510 01:17:08.993586 1991 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1"} May 10 01:17:08.994747 kubelet[1991]: E0510 01:17:08.993670 1991 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"828cc85f-6fb9-4e67-adff-af880ac7ed1f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:17:08.994747 kubelet[1991]: E0510 01:17:08.993736 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"828cc85f-6fb9-4e67-adff-af880ac7ed1f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xfs7c" podUID="828cc85f-6fb9-4e67-adff-af880ac7ed1f" May 10 01:17:08.997366 env[1189]: time="2025-05-10T01:17:08.995319282Z" level=error msg="StopPodSandbox for \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\" failed" error="failed to destroy network for sandbox \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:08.997497 kubelet[1991]: E0510 01:17:08.995634 1991 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" May 10 01:17:08.997497 kubelet[1991]: E0510 01:17:08.995791 1991 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe"} May 10 01:17:08.997497 kubelet[1991]: E0510 01:17:08.995857 1991 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a8202034-330d-4ba1-b2a5-d033aec45ae4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:17:08.997497 kubelet[1991]: E0510 01:17:08.995922 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a8202034-330d-4ba1-b2a5-d033aec45ae4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-gzcsf" podUID="a8202034-330d-4ba1-b2a5-d033aec45ae4" May 10 01:17:09.314759 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356-shm.mount: Deactivated successfully. May 10 01:17:16.751281 kubelet[1991]: I0510 01:17:16.751155 1991 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 01:17:17.101305 kernel: kauditd_printk_skb: 34 callbacks suppressed May 10 01:17:17.101853 kernel: audit: type=1325 audit(1746839837.093:1031): table=filter:95 family=2 entries=17 op=nft_register_rule pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:17:17.093000 audit[3002]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:17:17.093000 audit[3002]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe7a11c460 a2=0 a3=7ffe7a11c44c items=0 ppid=2163 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:17.121760 kernel: audit: type=1300 audit(1746839837.093:1031): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe7a11c460 a2=0 a3=7ffe7a11c44c items=0 ppid=2163 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:17.121870 kernel: audit: type=1327 audit(1746839837.093:1031): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:17:17.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:17:17.128163 kernel: audit: type=1325 audit(1746839837.115:1032): table=nat:96 family=2 entries=19 op=nft_register_chain pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:17:17.115000 audit[3002]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:17:17.115000 audit[3002]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe7a11c460 a2=0 a3=7ffe7a11c44c items=0 ppid=2163 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:17.137906 kernel: audit: type=1300 audit(1746839837.115:1032): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe7a11c460 a2=0 a3=7ffe7a11c44c items=0 ppid=2163 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:17.115000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:17:17.144378 kernel: audit: type=1327 audit(1746839837.115:1032): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:17:19.605958 env[1189]: time="2025-05-10T01:17:19.605719793Z" level=info msg="StopPodSandbox for \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\"" May 10 01:17:19.621565 env[1189]: time="2025-05-10T01:17:19.621500097Z" level=info msg="StopPodSandbox for \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\"" May 10 01:17:19.747300 env[1189]: time="2025-05-10T01:17:19.747216500Z" level=error msg="StopPodSandbox for \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\" failed" error="failed to destroy network for sandbox \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:19.748728 kubelet[1991]: E0510 01:17:19.748464 1991 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" May 10 01:17:19.751504 kubelet[1991]: E0510 01:17:19.751210 1991 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9"} May 10 01:17:19.751504 kubelet[1991]: E0510 01:17:19.751332 1991 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3b8a75fb-e300-4c19-b234-964ddae047ca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:17:19.751504 kubelet[1991]: E0510 01:17:19.751409 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3b8a75fb-e300-4c19-b234-964ddae047ca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5bbd7d95bb-vwbw7" podUID="3b8a75fb-e300-4c19-b234-964ddae047ca" May 10 01:17:19.762386 env[1189]: time="2025-05-10T01:17:19.762308062Z" level=error msg="StopPodSandbox for \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\" failed" error="failed to destroy network for sandbox \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:19.767811 kubelet[1991]: E0510 01:17:19.767450 1991 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" May 10 01:17:19.767811 kubelet[1991]: E0510 01:17:19.767588 1991 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d"} May 10 01:17:19.767811 kubelet[1991]: E0510 01:17:19.767671 1991 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d62fc1e5-8a86-41aa-9230-dba166d93b57\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:17:19.767811 kubelet[1991]: E0510 01:17:19.767739 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d62fc1e5-8a86-41aa-9230-dba166d93b57\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-778fbb4795-597wd" podUID="d62fc1e5-8a86-41aa-9230-dba166d93b57" May 10 01:17:20.603324 env[1189]: time="2025-05-10T01:17:20.603218103Z" level=info msg="StopPodSandbox for \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\"" May 10 01:17:20.690981 env[1189]: time="2025-05-10T01:17:20.690897848Z" level=error msg="StopPodSandbox for \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\" failed" error="failed to destroy network for sandbox \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:20.692466 kubelet[1991]: E0510 01:17:20.692003 1991 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" May 10 01:17:20.692466 kubelet[1991]: E0510 01:17:20.692178 1991 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356"} May 10 01:17:20.692466 kubelet[1991]: E0510 01:17:20.692287 1991 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4d3687fd-fc69-446e-87a9-b2f0538e94b3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:17:20.692466 kubelet[1991]: E0510 01:17:20.692370 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4d3687fd-fc69-446e-87a9-b2f0538e94b3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-778fbb4795-znbw9" podUID="4d3687fd-fc69-446e-87a9-b2f0538e94b3" May 10 01:17:21.508227 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4160036131.mount: Deactivated successfully. May 10 01:17:21.564312 env[1189]: time="2025-05-10T01:17:21.564244791Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:21.567659 env[1189]: time="2025-05-10T01:17:21.567618083Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:21.570005 env[1189]: time="2025-05-10T01:17:21.569838452Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:21.571982 env[1189]: time="2025-05-10T01:17:21.571941850Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:21.573312 env[1189]: time="2025-05-10T01:17:21.573261961Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 10 01:17:21.611089 env[1189]: time="2025-05-10T01:17:21.610224599Z" level=info msg="StopPodSandbox for \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\"" May 10 01:17:21.611089 env[1189]: time="2025-05-10T01:17:21.610900654Z" level=info msg="StopPodSandbox for \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\"" May 10 01:17:21.633348 env[1189]: time="2025-05-10T01:17:21.633289375Z" level=info msg="CreateContainer within sandbox \"a6696fa928c9dd673d884cd963cbe53d3aa4a1d1dc48da66352083750e69f2e5\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 01:17:21.656645 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1549851577.mount: Deactivated successfully. May 10 01:17:21.662718 env[1189]: time="2025-05-10T01:17:21.662646951Z" level=info msg="CreateContainer within sandbox \"a6696fa928c9dd673d884cd963cbe53d3aa4a1d1dc48da66352083750e69f2e5\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"8e062c4815713189d2d3dbf99d5ae23c576453d3acfcd6cf3ad1e37e308566f5\"" May 10 01:17:21.688616 env[1189]: time="2025-05-10T01:17:21.688521656Z" level=info msg="StartContainer for \"8e062c4815713189d2d3dbf99d5ae23c576453d3acfcd6cf3ad1e37e308566f5\"" May 10 01:17:21.741821 env[1189]: time="2025-05-10T01:17:21.741698728Z" level=error msg="StopPodSandbox for \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\" failed" error="failed to destroy network for sandbox \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:21.744253 kubelet[1991]: E0510 01:17:21.744186 1991 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" May 10 01:17:21.744674 kubelet[1991]: E0510 01:17:21.744288 1991 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1"} May 10 01:17:21.744674 kubelet[1991]: E0510 01:17:21.744374 1991 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"828cc85f-6fb9-4e67-adff-af880ac7ed1f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:17:21.744674 kubelet[1991]: E0510 01:17:21.744456 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"828cc85f-6fb9-4e67-adff-af880ac7ed1f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xfs7c" podUID="828cc85f-6fb9-4e67-adff-af880ac7ed1f" May 10 01:17:21.744988 kubelet[1991]: E0510 01:17:21.744880 1991 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" May 10 01:17:21.744988 kubelet[1991]: E0510 01:17:21.744946 1991 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe"} May 10 01:17:21.745151 env[1189]: time="2025-05-10T01:17:21.744644559Z" level=error msg="StopPodSandbox for \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\" failed" error="failed to destroy network for sandbox \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:17:21.745230 kubelet[1991]: E0510 01:17:21.745003 1991 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a8202034-330d-4ba1-b2a5-d033aec45ae4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:17:21.745230 kubelet[1991]: E0510 01:17:21.745034 1991 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a8202034-330d-4ba1-b2a5-d033aec45ae4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-gzcsf" podUID="a8202034-330d-4ba1-b2a5-d033aec45ae4" May 10 01:17:21.767492 systemd[1]: Started cri-containerd-8e062c4815713189d2d3dbf99d5ae23c576453d3acfcd6cf3ad1e37e308566f5.scope. May 10 01:17:21.815000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.849920 kernel: audit: type=1400 audit(1746839841.815:1033): avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.850066 kernel: audit: type=1300 audit(1746839841.815:1033): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fd43c3f7a48 items=0 ppid=2410 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:21.815000 audit[3109]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fd43c3f7a48 items=0 ppid=2410 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:21.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865303632633438313537313331383964326433646266393964356165 May 10 01:17:21.864662 kernel: audit: type=1327 audit(1746839841.815:1033): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865303632633438313537313331383964326433646266393964356165 May 10 01:17:21.864780 kernel: audit: type=1400 audit(1746839841.815:1034): avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.815000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.815000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.815000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.815000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.815000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.815000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.815000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.815000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.815000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.815000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.815000 audit: BPF prog-id=142 op=LOAD May 10 01:17:21.815000 audit[3109]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002f6938 items=0 ppid=2410 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:21.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865303632633438313537313331383964326433646266393964356165 May 10 01:17:21.846000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.846000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.846000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.846000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.846000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.846000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.846000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.846000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.846000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.846000 audit: BPF prog-id=143 op=LOAD May 10 01:17:21.846000 audit[3109]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002f6988 items=0 ppid=2410 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:21.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865303632633438313537313331383964326433646266393964356165 May 10 01:17:21.846000 audit: BPF prog-id=143 op=UNLOAD May 10 01:17:21.847000 audit: BPF prog-id=142 op=UNLOAD May 10 01:17:21.847000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.847000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.847000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.847000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.847000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.847000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.847000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.847000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.847000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.847000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:21.847000 audit: BPF prog-id=144 op=LOAD May 10 01:17:21.847000 audit[3109]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002f6a18 items=0 ppid=2410 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:21.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865303632633438313537313331383964326433646266393964356165 May 10 01:17:21.893142 env[1189]: time="2025-05-10T01:17:21.893074391Z" level=info msg="StartContainer for \"8e062c4815713189d2d3dbf99d5ae23c576453d3acfcd6cf3ad1e37e308566f5\" returns successfully" May 10 01:17:22.330654 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 10 01:17:22.331016 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 10 01:17:22.901021 kubelet[1991]: I0510 01:17:22.896969 1991 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-z8jt6" podStartSLOduration=2.6770467079999998 podStartE2EDuration="30.895685226s" podCreationTimestamp="2025-05-10 01:16:52 +0000 UTC" firstStartedPulling="2025-05-10 01:16:53.356288271 +0000 UTC m=+14.095993333" lastFinishedPulling="2025-05-10 01:17:21.574926784 +0000 UTC m=+42.314631851" observedRunningTime="2025-05-10 01:17:22.891129443 +0000 UTC m=+43.630834520" watchObservedRunningTime="2025-05-10 01:17:22.895685226 +0000 UTC m=+43.635390311" May 10 01:17:22.921178 systemd[1]: run-containerd-runc-k8s.io-8e062c4815713189d2d3dbf99d5ae23c576453d3acfcd6cf3ad1e37e308566f5-runc.9e8XP2.mount: Deactivated successfully. May 10 01:17:23.604538 env[1189]: time="2025-05-10T01:17:23.604465526Z" level=info msg="StopPodSandbox for \"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\"" May 10 01:17:23.931102 systemd[1]: run-containerd-runc-k8s.io-8e062c4815713189d2d3dbf99d5ae23c576453d3acfcd6cf3ad1e37e308566f5-runc.U749eP.mount: Deactivated successfully. May 10 01:17:24.013005 env[1189]: 2025-05-10 01:17:23.734 [INFO][3208] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" May 10 01:17:24.013005 env[1189]: 2025-05-10 01:17:23.735 [INFO][3208] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" iface="eth0" netns="/var/run/netns/cni-3796303b-5df9-362c-3fc8-c295a61b4120" May 10 01:17:24.013005 env[1189]: 2025-05-10 01:17:23.735 [INFO][3208] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" iface="eth0" netns="/var/run/netns/cni-3796303b-5df9-362c-3fc8-c295a61b4120" May 10 01:17:24.013005 env[1189]: 2025-05-10 01:17:23.737 [INFO][3208] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" iface="eth0" netns="/var/run/netns/cni-3796303b-5df9-362c-3fc8-c295a61b4120" May 10 01:17:24.013005 env[1189]: 2025-05-10 01:17:23.737 [INFO][3208] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" May 10 01:17:24.013005 env[1189]: 2025-05-10 01:17:23.737 [INFO][3208] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" May 10 01:17:24.013005 env[1189]: 2025-05-10 01:17:23.959 [INFO][3215] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" HandleID="k8s-pod-network.88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0" May 10 01:17:24.013005 env[1189]: 2025-05-10 01:17:23.981 [INFO][3215] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:24.013005 env[1189]: 2025-05-10 01:17:23.983 [INFO][3215] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:24.013005 env[1189]: 2025-05-10 01:17:24.006 [WARNING][3215] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" HandleID="k8s-pod-network.88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0" May 10 01:17:24.013005 env[1189]: 2025-05-10 01:17:24.006 [INFO][3215] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" HandleID="k8s-pod-network.88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0" May 10 01:17:24.013005 env[1189]: 2025-05-10 01:17:24.009 [INFO][3215] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:24.013005 env[1189]: 2025-05-10 01:17:24.011 [INFO][3208] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" May 10 01:17:24.016913 systemd[1]: run-netns-cni\x2d3796303b\x2d5df9\x2d362c\x2d3fc8\x2dc295a61b4120.mount: Deactivated successfully. May 10 01:17:24.017940 env[1189]: time="2025-05-10T01:17:24.017882435Z" level=info msg="TearDown network for sandbox \"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\" successfully" May 10 01:17:24.018086 env[1189]: time="2025-05-10T01:17:24.018050791Z" level=info msg="StopPodSandbox for \"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\" returns successfully" May 10 01:17:24.019641 env[1189]: time="2025-05-10T01:17:24.019576413Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-vhkxk,Uid:58e5027b-f4ac-4e2f-b07f-7833816a6c67,Namespace:kube-system,Attempt:1,}" May 10 01:17:24.239000 audit[3274]: AVC avc: denied { write } for pid=3274 comm="tee" name="fd" dev="proc" ino=28500 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 01:17:24.246454 kernel: kauditd_printk_skb: 39 callbacks suppressed May 10 01:17:24.246642 kernel: audit: type=1400 audit(1746839844.239:1039): avc: denied { write } for pid=3274 comm="tee" name="fd" dev="proc" ino=28500 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 01:17:24.239000 audit[3274]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdddb22a02 a2=241 a3=1b6 items=1 ppid=3230 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:24.239000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 01:17:24.262562 kernel: audit: type=1300 audit(1746839844.239:1039): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdddb22a02 a2=241 a3=1b6 items=1 ppid=3230 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:24.262697 kernel: audit: type=1307 audit(1746839844.239:1039): cwd="/etc/service/enabled/bird6/log" May 10 01:17:24.262787 kernel: audit: type=1302 audit(1746839844.239:1039): item=0 name="/dev/fd/63" inode=28473 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:17:24.239000 audit: PATH item=0 name="/dev/fd/63" inode=28473 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:17:24.239000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 01:17:24.273125 kernel: audit: type=1327 audit(1746839844.239:1039): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 01:17:24.289000 audit[3308]: AVC avc: denied { write } for pid=3308 comm="tee" name="fd" dev="proc" ino=29064 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 01:17:24.289000 audit[3317]: AVC avc: denied { write } for pid=3317 comm="tee" name="fd" dev="proc" ino=28517 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 01:17:24.302444 kernel: audit: type=1400 audit(1746839844.289:1040): avc: denied { write } for pid=3308 comm="tee" name="fd" dev="proc" ino=29064 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 01:17:24.302639 kernel: audit: type=1400 audit(1746839844.289:1041): avc: denied { write } for pid=3317 comm="tee" name="fd" dev="proc" ino=28517 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 01:17:24.289000 audit[3317]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffed9b2a02 a2=241 a3=1b6 items=1 ppid=3239 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:24.314840 kernel: audit: type=1300 audit(1746839844.289:1041): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffed9b2a02 a2=241 a3=1b6 items=1 ppid=3239 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:24.289000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 01:17:24.319772 kernel: audit: type=1307 audit(1746839844.289:1041): cwd="/etc/service/enabled/confd/log" May 10 01:17:24.289000 audit: PATH item=0 name="/dev/fd/63" inode=28514 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:17:24.326780 kernel: audit: type=1302 audit(1746839844.289:1041): item=0 name="/dev/fd/63" inode=28514 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:17:24.289000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 01:17:24.289000 audit[3308]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc59ebda03 a2=241 a3=1b6 items=1 ppid=3234 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:24.289000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 01:17:24.289000 audit: PATH item=0 name="/dev/fd/63" inode=29055 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:17:24.289000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 01:17:24.331000 audit[3315]: AVC avc: denied { write } for pid=3315 comm="tee" name="fd" dev="proc" ino=29071 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 01:17:24.337000 audit[3312]: AVC avc: denied { write } for pid=3312 comm="tee" name="fd" dev="proc" ino=29072 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 01:17:24.337000 audit[3312]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc08dbba04 a2=241 a3=1b6 items=1 ppid=3254 pid=3312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:24.337000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 01:17:24.337000 audit: PATH item=0 name="/dev/fd/63" inode=29056 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:17:24.337000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 01:17:24.331000 audit[3315]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc175c59f2 a2=241 a3=1b6 items=1 ppid=3244 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:24.331000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 01:17:24.331000 audit: PATH item=0 name="/dev/fd/63" inode=29059 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:17:24.331000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 01:17:24.346000 audit[3325]: AVC avc: denied { write } for pid=3325 comm="tee" name="fd" dev="proc" ino=29080 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 01:17:24.346000 audit[3325]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff144f69f3 a2=241 a3=1b6 items=1 ppid=3247 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:24.346000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 01:17:24.346000 audit: PATH item=0 name="/dev/fd/63" inode=29077 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:17:24.346000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 01:17:24.352000 audit[3328]: AVC avc: denied { write } for pid=3328 comm="tee" name="fd" dev="proc" ino=29084 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 01:17:24.352000 audit[3328]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe744a1a02 a2=241 a3=1b6 items=1 ppid=3229 pid=3328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:24.352000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 01:17:24.352000 audit: PATH item=0 name="/dev/fd/63" inode=28522 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:17:24.352000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 01:17:24.423298 systemd-networkd[1025]: cali7a9fcf14581: Link UP May 10 01:17:24.432351 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 01:17:24.433723 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7a9fcf14581: link becomes ready May 10 01:17:24.434787 systemd-networkd[1025]: cali7a9fcf14581: Gained carrier May 10 01:17:24.465282 env[1189]: 2025-05-10 01:17:24.094 [INFO][3276] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 10 01:17:24.465282 env[1189]: 2025-05-10 01:17:24.120 [INFO][3276] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0 coredns-6f6b679f8f- kube-system 58e5027b-f4ac-4e2f-b07f-7833816a6c67 785 0 2025-05-10 01:16:44 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-2kvu9.gb1.brightbox.com coredns-6f6b679f8f-vhkxk eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali7a9fcf14581 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6" Namespace="kube-system" Pod="coredns-6f6b679f8f-vhkxk" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-" May 10 01:17:24.465282 env[1189]: 2025-05-10 01:17:24.120 [INFO][3276] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6" Namespace="kube-system" Pod="coredns-6f6b679f8f-vhkxk" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0" May 10 01:17:24.465282 env[1189]: 2025-05-10 01:17:24.206 [INFO][3293] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6" HandleID="k8s-pod-network.60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0" May 10 01:17:24.465282 env[1189]: 2025-05-10 01:17:24.282 [INFO][3293] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6" HandleID="k8s-pod-network.60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031ab30), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-2kvu9.gb1.brightbox.com", "pod":"coredns-6f6b679f8f-vhkxk", "timestamp":"2025-05-10 01:17:24.205681434 +0000 UTC"}, Hostname:"srv-2kvu9.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 01:17:24.465282 env[1189]: 2025-05-10 01:17:24.283 [INFO][3293] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:24.465282 env[1189]: 2025-05-10 01:17:24.283 [INFO][3293] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:24.465282 env[1189]: 2025-05-10 01:17:24.283 [INFO][3293] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-2kvu9.gb1.brightbox.com' May 10 01:17:24.465282 env[1189]: 2025-05-10 01:17:24.289 [INFO][3293] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:24.465282 env[1189]: 2025-05-10 01:17:24.328 [INFO][3293] ipam/ipam.go 372: Looking up existing affinities for host host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:24.465282 env[1189]: 2025-05-10 01:17:24.346 [INFO][3293] ipam/ipam.go 489: Trying affinity for 192.168.76.192/26 host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:24.465282 env[1189]: 2025-05-10 01:17:24.355 [INFO][3293] ipam/ipam.go 155: Attempting to load block cidr=192.168.76.192/26 host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:24.465282 env[1189]: 2025-05-10 01:17:24.359 [INFO][3293] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.192/26 host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:24.465282 env[1189]: 2025-05-10 01:17:24.359 [INFO][3293] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.192/26 handle="k8s-pod-network.60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:24.465282 env[1189]: 2025-05-10 01:17:24.364 [INFO][3293] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6 May 10 01:17:24.465282 env[1189]: 2025-05-10 01:17:24.374 [INFO][3293] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.76.192/26 handle="k8s-pod-network.60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:24.465282 env[1189]: 2025-05-10 01:17:24.386 [INFO][3293] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.76.193/26] block=192.168.76.192/26 handle="k8s-pod-network.60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:24.465282 env[1189]: 2025-05-10 01:17:24.386 [INFO][3293] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.193/26] handle="k8s-pod-network.60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:24.465282 env[1189]: 2025-05-10 01:17:24.386 [INFO][3293] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:24.465282 env[1189]: 2025-05-10 01:17:24.386 [INFO][3293] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.193/26] IPv6=[] ContainerID="60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6" HandleID="k8s-pod-network.60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0" May 10 01:17:24.470267 env[1189]: 2025-05-10 01:17:24.390 [INFO][3276] cni-plugin/k8s.go 386: Populated endpoint ContainerID="60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6" Namespace="kube-system" Pod="coredns-6f6b679f8f-vhkxk" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"58e5027b-f4ac-4e2f-b07f-7833816a6c67", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"", Pod:"coredns-6f6b679f8f-vhkxk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7a9fcf14581", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:24.470267 env[1189]: 2025-05-10 01:17:24.390 [INFO][3276] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.76.193/32] ContainerID="60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6" Namespace="kube-system" Pod="coredns-6f6b679f8f-vhkxk" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0" May 10 01:17:24.470267 env[1189]: 2025-05-10 01:17:24.391 [INFO][3276] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7a9fcf14581 ContainerID="60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6" Namespace="kube-system" Pod="coredns-6f6b679f8f-vhkxk" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0" May 10 01:17:24.470267 env[1189]: 2025-05-10 01:17:24.438 [INFO][3276] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6" Namespace="kube-system" Pod="coredns-6f6b679f8f-vhkxk" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0" May 10 01:17:24.470267 env[1189]: 2025-05-10 01:17:24.440 [INFO][3276] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6" Namespace="kube-system" Pod="coredns-6f6b679f8f-vhkxk" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"58e5027b-f4ac-4e2f-b07f-7833816a6c67", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6", Pod:"coredns-6f6b679f8f-vhkxk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7a9fcf14581", MAC:"de:10:60:88:56:a6", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:24.470267 env[1189]: 2025-05-10 01:17:24.462 [INFO][3276] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6" Namespace="kube-system" Pod="coredns-6f6b679f8f-vhkxk" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0" May 10 01:17:24.520368 env[1189]: time="2025-05-10T01:17:24.520122198Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:17:24.520679 env[1189]: time="2025-05-10T01:17:24.520632337Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:17:24.520885 env[1189]: time="2025-05-10T01:17:24.520826550Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:17:24.522697 env[1189]: time="2025-05-10T01:17:24.522601499Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6 pid=3366 runtime=io.containerd.runc.v2 May 10 01:17:24.569638 systemd[1]: Started cri-containerd-60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6.scope. May 10 01:17:24.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.603000 audit: BPF prog-id=145 op=LOAD May 10 01:17:24.604000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.604000 audit[3376]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3366 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:24.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630646665336531656261666430303163383438656533326633666336 May 10 01:17:24.606000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.606000 audit[3376]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3366 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:24.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630646665336531656261666430303163383438656533326633666336 May 10 01:17:24.606000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.606000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.606000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.606000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.606000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.606000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.606000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.606000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.606000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.606000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.606000 audit: BPF prog-id=146 op=LOAD May 10 01:17:24.606000 audit[3376]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00035dff0 items=0 ppid=3366 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:24.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630646665336531656261666430303163383438656533326633666336 May 10 01:17:24.606000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.606000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.606000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.606000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.606000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.606000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.606000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.606000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.606000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.606000 audit: BPF prog-id=147 op=LOAD May 10 01:17:24.606000 audit[3376]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003dc038 items=0 ppid=3366 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:24.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630646665336531656261666430303163383438656533326633666336 May 10 01:17:24.607000 audit: BPF prog-id=147 op=UNLOAD May 10 01:17:24.607000 audit: BPF prog-id=146 op=UNLOAD May 10 01:17:24.610000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.610000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.610000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.610000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.610000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.610000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.610000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.610000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.610000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.610000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.610000 audit: BPF prog-id=148 op=LOAD May 10 01:17:24.610000 audit[3376]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003dc448 items=0 ppid=3366 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:24.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630646665336531656261666430303163383438656533326633666336 May 10 01:17:24.684299 env[1189]: time="2025-05-10T01:17:24.684225313Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-vhkxk,Uid:58e5027b-f4ac-4e2f-b07f-7833816a6c67,Namespace:kube-system,Attempt:1,} returns sandbox id \"60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6\"" May 10 01:17:24.692745 env[1189]: time="2025-05-10T01:17:24.691325376Z" level=info msg="CreateContainer within sandbox \"60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 01:17:24.721356 env[1189]: time="2025-05-10T01:17:24.721290222Z" level=info msg="CreateContainer within sandbox \"60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"5adbff99a2cba71e0098f5dc2248adf96c8ab6b228607098543e7078f1e2d6a5\"" May 10 01:17:24.722874 env[1189]: time="2025-05-10T01:17:24.722826740Z" level=info msg="StartContainer for \"5adbff99a2cba71e0098f5dc2248adf96c8ab6b228607098543e7078f1e2d6a5\"" May 10 01:17:24.771269 systemd[1]: Started cri-containerd-5adbff99a2cba71e0098f5dc2248adf96c8ab6b228607098543e7078f1e2d6a5.scope. May 10 01:17:24.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.827000 audit: BPF prog-id=149 op=LOAD May 10 01:17:24.828000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.828000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3366 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:24.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561646266663939613263626137316530303938663564633232343861 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3366 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:24.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561646266663939613263626137316530303938663564633232343861 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit: BPF prog-id=150 op=LOAD May 10 01:17:24.829000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000304a20 items=0 ppid=3366 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:24.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561646266663939613263626137316530303938663564633232343861 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit: BPF prog-id=151 op=LOAD May 10 01:17:24.829000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000304a68 items=0 ppid=3366 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:24.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561646266663939613263626137316530303938663564633232343861 May 10 01:17:24.829000 audit: BPF prog-id=151 op=UNLOAD May 10 01:17:24.829000 audit: BPF prog-id=150 op=UNLOAD May 10 01:17:24.829000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:24.829000 audit: BPF prog-id=152 op=LOAD May 10 01:17:24.829000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000304e78 items=0 ppid=3366 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:24.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561646266663939613263626137316530303938663564633232343861 May 10 01:17:24.878001 env[1189]: time="2025-05-10T01:17:24.877919949Z" level=info msg="StartContainer for \"5adbff99a2cba71e0098f5dc2248adf96c8ab6b228607098543e7078f1e2d6a5\" returns successfully" May 10 01:17:25.470000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.470000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.470000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.470000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.470000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.470000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.470000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.470000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.470000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.470000 audit: BPF prog-id=153 op=LOAD May 10 01:17:25.470000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd9ddb2120 a2=98 a3=3 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.470000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.472000 audit: BPF prog-id=153 op=UNLOAD May 10 01:17:25.477000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.477000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.477000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.477000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.477000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.477000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.477000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.477000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.477000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.477000 audit: BPF prog-id=154 op=LOAD May 10 01:17:25.477000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd9ddb1f00 a2=74 a3=540051 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.477000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.481000 audit: BPF prog-id=154 op=UNLOAD May 10 01:17:25.481000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.481000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.481000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.481000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.481000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.481000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.481000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.481000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.481000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.481000 audit: BPF prog-id=155 op=LOAD May 10 01:17:25.481000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd9ddb1f30 a2=94 a3=2 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.481000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.482000 audit: BPF prog-id=155 op=UNLOAD May 10 01:17:25.576116 systemd-networkd[1025]: cali7a9fcf14581: Gained IPv6LL May 10 01:17:25.662000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.662000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.662000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.662000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.662000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.662000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.662000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.662000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.662000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.662000 audit: BPF prog-id=156 op=LOAD May 10 01:17:25.662000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd9ddb1df0 a2=40 a3=1 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.662000 audit: BPF prog-id=156 op=UNLOAD May 10 01:17:25.662000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.662000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd9ddb1ec0 a2=50 a3=7ffd9ddb1fa0 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.675000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.675000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9ddb1e00 a2=28 a3=0 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.675000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.675000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.675000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9ddb1e30 a2=28 a3=0 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.675000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.675000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.675000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9ddb1d40 a2=28 a3=0 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.675000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.676000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.676000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9ddb1e50 a2=28 a3=0 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.676000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.676000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.676000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9ddb1e30 a2=28 a3=0 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.676000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.676000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.676000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9ddb1e20 a2=28 a3=0 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.676000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.676000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.676000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9ddb1e50 a2=28 a3=0 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.676000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.676000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.676000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9ddb1e30 a2=28 a3=0 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.676000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.676000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.676000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9ddb1e50 a2=28 a3=0 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.676000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.676000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.676000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9ddb1e20 a2=28 a3=0 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.676000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.677000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.677000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9ddb1e90 a2=28 a3=0 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.677000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.679000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd9ddb1c40 a2=50 a3=1 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.679000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.679000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit: BPF prog-id=157 op=LOAD May 10 01:17:25.679000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd9ddb1c40 a2=94 a3=5 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.679000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.679000 audit: BPF prog-id=157 op=UNLOAD May 10 01:17:25.679000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd9ddb1cf0 a2=50 a3=1 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.679000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.679000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd9ddb1e10 a2=4 a3=38 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.679000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.679000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.679000 audit[3497]: AVC avc: denied { confidentiality } for pid=3497 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 01:17:25.679000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd9ddb1e60 a2=94 a3=6 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.679000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.683000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.683000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.683000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.683000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.683000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.683000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.683000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.683000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.683000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.683000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.683000 audit[3497]: AVC avc: denied { confidentiality } for pid=3497 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 01:17:25.683000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd9ddb1610 a2=94 a3=83 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.683000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.683000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.683000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.683000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.683000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.683000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.683000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.683000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.683000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.683000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.683000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.683000 audit[3497]: AVC avc: denied { confidentiality } for pid=3497 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 01:17:25.683000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd9ddb1610 a2=94 a3=83 items=0 ppid=3246 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.683000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:17:25.702000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.702000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.702000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.702000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.702000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.702000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.702000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.702000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.702000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.702000 audit: BPF prog-id=158 op=LOAD May 10 01:17:25.702000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9fba8ad0 a2=98 a3=1999999999999999 items=0 ppid=3246 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.702000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 01:17:25.704000 audit: BPF prog-id=158 op=UNLOAD May 10 01:17:25.704000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.704000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.704000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.704000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.704000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.704000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.704000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.704000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.704000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.704000 audit: BPF prog-id=159 op=LOAD May 10 01:17:25.704000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9fba89b0 a2=74 a3=ffff items=0 ppid=3246 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.704000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 01:17:25.705000 audit: BPF prog-id=159 op=UNLOAD May 10 01:17:25.705000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.705000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.705000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.705000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.705000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.705000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.705000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.705000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.705000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.705000 audit: BPF prog-id=160 op=LOAD May 10 01:17:25.705000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9fba89f0 a2=40 a3=7ffe9fba8bd0 items=0 ppid=3246 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.705000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 01:17:25.705000 audit: BPF prog-id=160 op=UNLOAD May 10 01:17:25.830232 systemd-networkd[1025]: vxlan.calico: Link UP May 10 01:17:25.830255 systemd-networkd[1025]: vxlan.calico: Gained carrier May 10 01:17:25.843000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.843000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.843000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.843000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.843000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.843000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.843000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.843000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.843000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.843000 audit: BPF prog-id=161 op=LOAD May 10 01:17:25.843000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcca535300 a2=98 a3=100 items=0 ppid=3246 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.843000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:17:25.843000 audit: BPF prog-id=161 op=UNLOAD May 10 01:17:25.846000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit: BPF prog-id=162 op=LOAD May 10 01:17:25.846000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcca535110 a2=74 a3=540051 items=0 ppid=3246 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.846000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:17:25.846000 audit: BPF prog-id=162 op=UNLOAD May 10 01:17:25.846000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit: BPF prog-id=163 op=LOAD May 10 01:17:25.846000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcca535140 a2=94 a3=2 items=0 ppid=3246 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.846000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:17:25.846000 audit: BPF prog-id=163 op=UNLOAD May 10 01:17:25.846000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcca535010 a2=28 a3=0 items=0 ppid=3246 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.846000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcca535040 a2=28 a3=0 items=0 ppid=3246 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.846000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcca534f50 a2=28 a3=0 items=0 ppid=3246 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.846000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcca535060 a2=28 a3=0 items=0 ppid=3246 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.846000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcca535040 a2=28 a3=0 items=0 ppid=3246 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.846000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcca535030 a2=28 a3=0 items=0 ppid=3246 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.846000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcca535060 a2=28 a3=0 items=0 ppid=3246 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.846000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcca535040 a2=28 a3=0 items=0 ppid=3246 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.846000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:17:25.846000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.846000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcca535060 a2=28 a3=0 items=0 ppid=3246 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.846000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:17:25.847000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.847000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcca535030 a2=28 a3=0 items=0 ppid=3246 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.847000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:17:25.847000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.847000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcca5350a0 a2=28 a3=0 items=0 ppid=3246 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.847000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:17:25.847000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.847000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.847000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.847000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.847000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.847000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.847000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.847000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.847000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.847000 audit: BPF prog-id=164 op=LOAD May 10 01:17:25.847000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcca534f10 a2=40 a3=0 items=0 ppid=3246 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.847000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:17:25.847000 audit: BPF prog-id=164 op=UNLOAD May 10 01:17:25.848000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.848000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffcca534f00 a2=50 a3=2800 items=0 ppid=3246 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.848000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:17:25.848000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.848000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffcca534f00 a2=50 a3=2800 items=0 ppid=3246 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.848000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:17:25.849000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.849000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.849000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.849000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.849000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.849000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.849000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.849000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.849000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.849000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.849000 audit: BPF prog-id=165 op=LOAD May 10 01:17:25.849000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcca534720 a2=94 a3=2 items=0 ppid=3246 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.849000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:17:25.849000 audit: BPF prog-id=165 op=UNLOAD May 10 01:17:25.849000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.849000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.849000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.849000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.849000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.849000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.849000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.849000 audit[3525]: AVC avc: denied { perfmon } for pid=3525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.849000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.849000 audit[3525]: AVC avc: denied { bpf } for pid=3525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.849000 audit: BPF prog-id=166 op=LOAD May 10 01:17:25.849000 audit[3525]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcca534820 a2=94 a3=30 items=0 ppid=3246 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.849000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:17:25.855000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.855000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.855000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.855000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.855000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.855000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.855000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.855000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.855000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.855000 audit: BPF prog-id=167 op=LOAD May 10 01:17:25.855000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd513c00f0 a2=98 a3=0 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:25.856000 audit: BPF prog-id=167 op=UNLOAD May 10 01:17:25.856000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.856000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.856000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.856000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.856000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.856000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.856000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.856000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.856000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.856000 audit: BPF prog-id=168 op=LOAD May 10 01:17:25.856000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd513bfed0 a2=74 a3=540051 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.856000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:25.857000 audit: BPF prog-id=168 op=UNLOAD May 10 01:17:25.857000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.857000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.857000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.857000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.857000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.857000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.857000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.857000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.857000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:25.857000 audit: BPF prog-id=169 op=LOAD May 10 01:17:25.857000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd513bff00 a2=94 a3=2 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:25.857000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:25.857000 audit: BPF prog-id=169 op=UNLOAD May 10 01:17:25.956455 kubelet[1991]: I0510 01:17:25.956072 1991 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-vhkxk" podStartSLOduration=41.956035065 podStartE2EDuration="41.956035065s" podCreationTimestamp="2025-05-10 01:16:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 01:17:25.921969145 +0000 UTC m=+46.661674221" watchObservedRunningTime="2025-05-10 01:17:25.956035065 +0000 UTC m=+46.695740138" May 10 01:17:26.087000 audit[3543]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=3543 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:17:26.087000 audit[3543]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffda194e6e0 a2=0 a3=7ffda194e6cc items=0 ppid=2163 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.087000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:17:26.094000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.094000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.094000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.094000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.094000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.094000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.094000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.094000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.094000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.094000 audit: BPF prog-id=170 op=LOAD May 10 01:17:26.094000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd513bfdc0 a2=40 a3=1 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.094000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.099000 audit: BPF prog-id=170 op=UNLOAD May 10 01:17:26.099000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.099000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd513bfe90 a2=50 a3=7ffd513bff70 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.107000 audit[3543]: NETFILTER_CFG table=nat:98 family=2 entries=14 op=nft_register_rule pid=3543 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:17:26.107000 audit[3543]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffda194e6e0 a2=0 a3=0 items=0 ppid=2163 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.107000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:17:26.119000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.119000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd513bfdd0 a2=28 a3=0 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.119000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.119000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd513bfe00 a2=28 a3=0 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.119000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.119000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd513bfd10 a2=28 a3=0 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.119000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.119000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd513bfe20 a2=28 a3=0 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.119000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.119000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd513bfe00 a2=28 a3=0 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.119000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.119000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd513bfdf0 a2=28 a3=0 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.119000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.119000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd513bfe20 a2=28 a3=0 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.119000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.119000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd513bfe00 a2=28 a3=0 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.119000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.119000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd513bfe20 a2=28 a3=0 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.119000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.119000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd513bfdf0 a2=28 a3=0 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd513bfe60 a2=28 a3=0 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.120000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd513bfc10 a2=50 a3=1 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.120000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit: BPF prog-id=171 op=LOAD May 10 01:17:26.120000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd513bfc10 a2=94 a3=5 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.120000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.120000 audit: BPF prog-id=171 op=UNLOAD May 10 01:17:26.120000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd513bfcc0 a2=50 a3=1 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.120000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd513bfde0 a2=4 a3=38 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.120000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.120000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 01:17:26.120000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd513bfe30 a2=94 a3=6 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.120000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 01:17:26.121000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd513bf5e0 a2=94 a3=83 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.121000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { confidentiality } for pid=3530 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 01:17:26.121000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd513bf5e0 a2=94 a3=83 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.121000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.121000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.121000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd513c1020 a2=10 a3=f1f00800 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.121000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.122000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.122000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd513c0ec0 a2=10 a3=3 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.122000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.122000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.122000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd513c0e60 a2=10 a3=3 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.122000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.122000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:26.122000 audit[3530]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd513c0e60 a2=10 a3=7 items=0 ppid=3246 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.122000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:17:26.134000 audit: BPF prog-id=166 op=UNLOAD May 10 01:17:26.265000 audit[3571]: NETFILTER_CFG table=mangle:99 family=2 entries=16 op=nft_register_chain pid=3571 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 01:17:26.265000 audit[3571]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc42a32b60 a2=0 a3=7ffc42a32b4c items=0 ppid=3246 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.265000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 01:17:26.276000 audit[3570]: NETFILTER_CFG table=nat:100 family=2 entries=15 op=nft_register_chain pid=3570 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 01:17:26.276000 audit[3570]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff3a402b30 a2=0 a3=7fff3a402b1c items=0 ppid=3246 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.276000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 01:17:26.289000 audit[3568]: NETFILTER_CFG table=raw:101 family=2 entries=21 op=nft_register_chain pid=3568 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 01:17:26.289000 audit[3568]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff7bfbb800 a2=0 a3=7fff7bfbb7ec items=0 ppid=3246 pid=3568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.289000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 01:17:26.290000 audit[3574]: NETFILTER_CFG table=filter:102 family=2 entries=69 op=nft_register_chain pid=3574 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 01:17:26.290000 audit[3574]: SYSCALL arch=c000003e syscall=46 success=yes exit=36404 a0=3 a1=7ffebc2594f0 a2=0 a3=7ffebc2594dc items=0 ppid=3246 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:26.290000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 01:17:27.001000 audit[3583]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=3583 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:17:27.001000 audit[3583]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff90af7130 a2=0 a3=7fff90af711c items=0 ppid=2163 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:27.001000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:17:27.008000 audit[3583]: NETFILTER_CFG table=nat:104 family=2 entries=35 op=nft_register_chain pid=3583 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:17:27.008000 audit[3583]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff90af7130 a2=0 a3=7fff90af711c items=0 ppid=2163 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:27.008000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:17:27.432179 systemd-networkd[1025]: vxlan.calico: Gained IPv6LL May 10 01:17:30.602277 env[1189]: time="2025-05-10T01:17:30.602177018Z" level=info msg="StopPodSandbox for \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\"" May 10 01:17:30.745192 env[1189]: 2025-05-10 01:17:30.688 [INFO][3602] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" May 10 01:17:30.745192 env[1189]: 2025-05-10 01:17:30.688 [INFO][3602] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" iface="eth0" netns="/var/run/netns/cni-cce228c1-a97d-e6a2-7487-6216d6689071" May 10 01:17:30.745192 env[1189]: 2025-05-10 01:17:30.688 [INFO][3602] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" iface="eth0" netns="/var/run/netns/cni-cce228c1-a97d-e6a2-7487-6216d6689071" May 10 01:17:30.745192 env[1189]: 2025-05-10 01:17:30.689 [INFO][3602] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" iface="eth0" netns="/var/run/netns/cni-cce228c1-a97d-e6a2-7487-6216d6689071" May 10 01:17:30.745192 env[1189]: 2025-05-10 01:17:30.689 [INFO][3602] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" May 10 01:17:30.745192 env[1189]: 2025-05-10 01:17:30.689 [INFO][3602] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" May 10 01:17:30.745192 env[1189]: 2025-05-10 01:17:30.725 [INFO][3610] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" HandleID="k8s-pod-network.e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0" May 10 01:17:30.745192 env[1189]: 2025-05-10 01:17:30.725 [INFO][3610] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:30.745192 env[1189]: 2025-05-10 01:17:30.726 [INFO][3610] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:30.745192 env[1189]: 2025-05-10 01:17:30.737 [WARNING][3610] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" HandleID="k8s-pod-network.e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0" May 10 01:17:30.745192 env[1189]: 2025-05-10 01:17:30.737 [INFO][3610] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" HandleID="k8s-pod-network.e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0" May 10 01:17:30.745192 env[1189]: 2025-05-10 01:17:30.740 [INFO][3610] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:30.745192 env[1189]: 2025-05-10 01:17:30.742 [INFO][3602] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" May 10 01:17:30.752185 env[1189]: time="2025-05-10T01:17:30.750548389Z" level=info msg="TearDown network for sandbox \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\" successfully" May 10 01:17:30.752185 env[1189]: time="2025-05-10T01:17:30.750647203Z" level=info msg="StopPodSandbox for \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\" returns successfully" May 10 01:17:30.752185 env[1189]: time="2025-05-10T01:17:30.752104425Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5bbd7d95bb-vwbw7,Uid:3b8a75fb-e300-4c19-b234-964ddae047ca,Namespace:calico-system,Attempt:1,}" May 10 01:17:30.749032 systemd[1]: run-netns-cni\x2dcce228c1\x2da97d\x2de6a2\x2d7487\x2d6216d6689071.mount: Deactivated successfully. May 10 01:17:31.007812 systemd-networkd[1025]: calia64f0b419fa: Link UP May 10 01:17:31.012876 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 01:17:31.013102 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia64f0b419fa: link becomes ready May 10 01:17:31.013306 systemd-networkd[1025]: calia64f0b419fa: Gained carrier May 10 01:17:31.041554 env[1189]: 2025-05-10 01:17:30.839 [INFO][3617] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0 calico-kube-controllers-5bbd7d95bb- calico-system 3b8a75fb-e300-4c19-b234-964ddae047ca 818 0 2025-05-10 01:16:53 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5bbd7d95bb projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s srv-2kvu9.gb1.brightbox.com calico-kube-controllers-5bbd7d95bb-vwbw7 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calia64f0b419fa [] []}} ContainerID="8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11" Namespace="calico-system" Pod="calico-kube-controllers-5bbd7d95bb-vwbw7" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-" May 10 01:17:31.041554 env[1189]: 2025-05-10 01:17:30.839 [INFO][3617] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11" Namespace="calico-system" Pod="calico-kube-controllers-5bbd7d95bb-vwbw7" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0" May 10 01:17:31.041554 env[1189]: 2025-05-10 01:17:30.928 [INFO][3630] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11" HandleID="k8s-pod-network.8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0" May 10 01:17:31.041554 env[1189]: 2025-05-10 01:17:30.945 [INFO][3630] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11" HandleID="k8s-pod-network.8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003bc5b0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-2kvu9.gb1.brightbox.com", "pod":"calico-kube-controllers-5bbd7d95bb-vwbw7", "timestamp":"2025-05-10 01:17:30.928476226 +0000 UTC"}, Hostname:"srv-2kvu9.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 01:17:31.041554 env[1189]: 2025-05-10 01:17:30.945 [INFO][3630] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:31.041554 env[1189]: 2025-05-10 01:17:30.946 [INFO][3630] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:31.041554 env[1189]: 2025-05-10 01:17:30.946 [INFO][3630] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-2kvu9.gb1.brightbox.com' May 10 01:17:31.041554 env[1189]: 2025-05-10 01:17:30.949 [INFO][3630] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:31.041554 env[1189]: 2025-05-10 01:17:30.957 [INFO][3630] ipam/ipam.go 372: Looking up existing affinities for host host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:31.041554 env[1189]: 2025-05-10 01:17:30.968 [INFO][3630] ipam/ipam.go 489: Trying affinity for 192.168.76.192/26 host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:31.041554 env[1189]: 2025-05-10 01:17:30.973 [INFO][3630] ipam/ipam.go 155: Attempting to load block cidr=192.168.76.192/26 host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:31.041554 env[1189]: 2025-05-10 01:17:30.976 [INFO][3630] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.192/26 host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:31.041554 env[1189]: 2025-05-10 01:17:30.977 [INFO][3630] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.192/26 handle="k8s-pod-network.8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:31.041554 env[1189]: 2025-05-10 01:17:30.981 [INFO][3630] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11 May 10 01:17:31.041554 env[1189]: 2025-05-10 01:17:30.990 [INFO][3630] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.76.192/26 handle="k8s-pod-network.8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:31.041554 env[1189]: 2025-05-10 01:17:31.000 [INFO][3630] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.76.194/26] block=192.168.76.192/26 handle="k8s-pod-network.8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:31.041554 env[1189]: 2025-05-10 01:17:31.000 [INFO][3630] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.194/26] handle="k8s-pod-network.8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:31.041554 env[1189]: 2025-05-10 01:17:31.000 [INFO][3630] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:31.041554 env[1189]: 2025-05-10 01:17:31.000 [INFO][3630] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.194/26] IPv6=[] ContainerID="8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11" HandleID="k8s-pod-network.8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0" May 10 01:17:31.043944 env[1189]: 2025-05-10 01:17:31.003 [INFO][3617] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11" Namespace="calico-system" Pod="calico-kube-controllers-5bbd7d95bb-vwbw7" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0", GenerateName:"calico-kube-controllers-5bbd7d95bb-", Namespace:"calico-system", SelfLink:"", UID:"3b8a75fb-e300-4c19-b234-964ddae047ca", ResourceVersion:"818", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5bbd7d95bb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"", Pod:"calico-kube-controllers-5bbd7d95bb-vwbw7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.76.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia64f0b419fa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:31.043944 env[1189]: 2025-05-10 01:17:31.003 [INFO][3617] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.76.194/32] ContainerID="8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11" Namespace="calico-system" Pod="calico-kube-controllers-5bbd7d95bb-vwbw7" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0" May 10 01:17:31.043944 env[1189]: 2025-05-10 01:17:31.003 [INFO][3617] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia64f0b419fa ContainerID="8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11" Namespace="calico-system" Pod="calico-kube-controllers-5bbd7d95bb-vwbw7" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0" May 10 01:17:31.043944 env[1189]: 2025-05-10 01:17:31.015 [INFO][3617] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11" Namespace="calico-system" Pod="calico-kube-controllers-5bbd7d95bb-vwbw7" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0" May 10 01:17:31.043944 env[1189]: 2025-05-10 01:17:31.017 [INFO][3617] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11" Namespace="calico-system" Pod="calico-kube-controllers-5bbd7d95bb-vwbw7" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0", GenerateName:"calico-kube-controllers-5bbd7d95bb-", Namespace:"calico-system", SelfLink:"", UID:"3b8a75fb-e300-4c19-b234-964ddae047ca", ResourceVersion:"818", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5bbd7d95bb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11", Pod:"calico-kube-controllers-5bbd7d95bb-vwbw7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.76.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia64f0b419fa", MAC:"aa:7e:4d:7a:32:97", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:31.043944 env[1189]: 2025-05-10 01:17:31.038 [INFO][3617] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11" Namespace="calico-system" Pod="calico-kube-controllers-5bbd7d95bb-vwbw7" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0" May 10 01:17:31.067129 env[1189]: time="2025-05-10T01:17:31.066994219Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:17:31.067129 env[1189]: time="2025-05-10T01:17:31.067084210Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:17:31.067541 env[1189]: time="2025-05-10T01:17:31.067483070Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:17:31.068099 env[1189]: time="2025-05-10T01:17:31.068026204Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11 pid=3660 runtime=io.containerd.runc.v2 May 10 01:17:31.083000 audit[3667]: NETFILTER_CFG table=filter:105 family=2 entries=38 op=nft_register_chain pid=3667 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 01:17:31.086571 kernel: kauditd_printk_skb: 631 callbacks suppressed May 10 01:17:31.086771 kernel: audit: type=1325 audit(1746839851.083:1181): table=filter:105 family=2 entries=38 op=nft_register_chain pid=3667 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 01:17:31.083000 audit[3667]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fff74eeaa30 a2=0 a3=7fff74eeaa1c items=0 ppid=3246 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:31.098895 kernel: audit: type=1300 audit(1746839851.083:1181): arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fff74eeaa30 a2=0 a3=7fff74eeaa1c items=0 ppid=3246 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:31.099102 kernel: audit: type=1327 audit(1746839851.083:1181): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 01:17:31.083000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 01:17:31.108780 systemd[1]: Started cri-containerd-8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11.scope. May 10 01:17:31.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.162846 kernel: audit: type=1400 audit(1746839851.155:1182): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.174803 kernel: audit: type=1400 audit(1746839851.155:1183): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.174926 kernel: audit: type=1400 audit(1746839851.155:1184): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.174981 kernel: audit: type=1400 audit(1746839851.155:1185): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.184911 kernel: audit: type=1400 audit(1746839851.155:1186): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.185052 kernel: audit: type=1400 audit(1746839851.155:1187): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.195468 kernel: audit: type=1400 audit(1746839851.155:1188): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.156000 audit: BPF prog-id=172 op=LOAD May 10 01:17:31.161000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.161000 audit[3670]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3660 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:31.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864376330303636633731386538643462306433643634616237363936 May 10 01:17:31.161000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.161000 audit[3670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3660 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:31.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864376330303636633731386538643462306433643634616237363936 May 10 01:17:31.161000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.161000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.161000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.161000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.161000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.161000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.161000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.161000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.161000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.161000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.161000 audit: BPF prog-id=173 op=LOAD May 10 01:17:31.161000 audit[3670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003decf0 items=0 ppid=3660 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:31.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864376330303636633731386538643462306433643634616237363936 May 10 01:17:31.162000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.162000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.162000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.162000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.162000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.162000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.162000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.162000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.162000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.162000 audit: BPF prog-id=174 op=LOAD May 10 01:17:31.162000 audit[3670]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003ded38 items=0 ppid=3660 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:31.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864376330303636633731386538643462306433643634616237363936 May 10 01:17:31.162000 audit: BPF prog-id=174 op=UNLOAD May 10 01:17:31.162000 audit: BPF prog-id=173 op=UNLOAD May 10 01:17:31.162000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.162000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.162000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.162000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.162000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.162000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.162000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.162000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.162000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.162000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:31.162000 audit: BPF prog-id=175 op=LOAD May 10 01:17:31.162000 audit[3670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003df148 items=0 ppid=3660 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:31.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864376330303636633731386538643462306433643634616237363936 May 10 01:17:31.235127 env[1189]: time="2025-05-10T01:17:31.235058490Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5bbd7d95bb-vwbw7,Uid:3b8a75fb-e300-4c19-b234-964ddae047ca,Namespace:calico-system,Attempt:1,} returns sandbox id \"8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11\"" May 10 01:17:31.240159 env[1189]: time="2025-05-10T01:17:31.238677306Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 10 01:17:31.603554 env[1189]: time="2025-05-10T01:17:31.602897453Z" level=info msg="StopPodSandbox for \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\"" May 10 01:17:31.604253 env[1189]: time="2025-05-10T01:17:31.604185237Z" level=info msg="StopPodSandbox for \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\"" May 10 01:17:31.748984 systemd[1]: run-containerd-runc-k8s.io-8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11-runc.q2maub.mount: Deactivated successfully. May 10 01:17:31.793032 env[1189]: 2025-05-10 01:17:31.702 [INFO][3729] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" May 10 01:17:31.793032 env[1189]: 2025-05-10 01:17:31.702 [INFO][3729] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" iface="eth0" netns="/var/run/netns/cni-d93f7fad-0832-43c9-032a-26232090e7d5" May 10 01:17:31.793032 env[1189]: 2025-05-10 01:17:31.703 [INFO][3729] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" iface="eth0" netns="/var/run/netns/cni-d93f7fad-0832-43c9-032a-26232090e7d5" May 10 01:17:31.793032 env[1189]: 2025-05-10 01:17:31.704 [INFO][3729] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" iface="eth0" netns="/var/run/netns/cni-d93f7fad-0832-43c9-032a-26232090e7d5" May 10 01:17:31.793032 env[1189]: 2025-05-10 01:17:31.705 [INFO][3729] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" May 10 01:17:31.793032 env[1189]: 2025-05-10 01:17:31.705 [INFO][3729] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" May 10 01:17:31.793032 env[1189]: 2025-05-10 01:17:31.768 [INFO][3742] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" HandleID="k8s-pod-network.22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0" May 10 01:17:31.793032 env[1189]: 2025-05-10 01:17:31.768 [INFO][3742] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:31.793032 env[1189]: 2025-05-10 01:17:31.769 [INFO][3742] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:31.793032 env[1189]: 2025-05-10 01:17:31.785 [WARNING][3742] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" HandleID="k8s-pod-network.22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0" May 10 01:17:31.793032 env[1189]: 2025-05-10 01:17:31.785 [INFO][3742] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" HandleID="k8s-pod-network.22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0" May 10 01:17:31.793032 env[1189]: 2025-05-10 01:17:31.789 [INFO][3742] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:31.793032 env[1189]: 2025-05-10 01:17:31.791 [INFO][3729] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" May 10 01:17:31.798522 env[1189]: time="2025-05-10T01:17:31.796528172Z" level=info msg="TearDown network for sandbox \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\" successfully" May 10 01:17:31.798522 env[1189]: time="2025-05-10T01:17:31.796594740Z" level=info msg="StopPodSandbox for \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\" returns successfully" May 10 01:17:31.798522 env[1189]: time="2025-05-10T01:17:31.798326780Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-778fbb4795-znbw9,Uid:4d3687fd-fc69-446e-87a9-b2f0538e94b3,Namespace:calico-apiserver,Attempt:1,}" May 10 01:17:31.796381 systemd[1]: run-netns-cni\x2dd93f7fad\x2d0832\x2d43c9\x2d032a\x2d26232090e7d5.mount: Deactivated successfully. May 10 01:17:31.833782 env[1189]: 2025-05-10 01:17:31.713 [INFO][3730] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" May 10 01:17:31.833782 env[1189]: 2025-05-10 01:17:31.713 [INFO][3730] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" iface="eth0" netns="/var/run/netns/cni-ba3355df-5e7d-a773-39f6-d1fd20e1dea9" May 10 01:17:31.833782 env[1189]: 2025-05-10 01:17:31.713 [INFO][3730] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" iface="eth0" netns="/var/run/netns/cni-ba3355df-5e7d-a773-39f6-d1fd20e1dea9" May 10 01:17:31.833782 env[1189]: 2025-05-10 01:17:31.714 [INFO][3730] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" iface="eth0" netns="/var/run/netns/cni-ba3355df-5e7d-a773-39f6-d1fd20e1dea9" May 10 01:17:31.833782 env[1189]: 2025-05-10 01:17:31.714 [INFO][3730] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" May 10 01:17:31.833782 env[1189]: 2025-05-10 01:17:31.714 [INFO][3730] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" May 10 01:17:31.833782 env[1189]: 2025-05-10 01:17:31.788 [INFO][3744] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" HandleID="k8s-pod-network.8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0" May 10 01:17:31.833782 env[1189]: 2025-05-10 01:17:31.790 [INFO][3744] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:31.833782 env[1189]: 2025-05-10 01:17:31.790 [INFO][3744] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:31.833782 env[1189]: 2025-05-10 01:17:31.815 [WARNING][3744] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" HandleID="k8s-pod-network.8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0" May 10 01:17:31.833782 env[1189]: 2025-05-10 01:17:31.815 [INFO][3744] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" HandleID="k8s-pod-network.8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0" May 10 01:17:31.833782 env[1189]: 2025-05-10 01:17:31.824 [INFO][3744] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:31.833782 env[1189]: 2025-05-10 01:17:31.828 [INFO][3730] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" May 10 01:17:31.834766 env[1189]: time="2025-05-10T01:17:31.834460090Z" level=info msg="TearDown network for sandbox \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\" successfully" May 10 01:17:31.834766 env[1189]: time="2025-05-10T01:17:31.834512766Z" level=info msg="StopPodSandbox for \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\" returns successfully" May 10 01:17:31.838083 env[1189]: time="2025-05-10T01:17:31.837673276Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-778fbb4795-597wd,Uid:d62fc1e5-8a86-41aa-9230-dba166d93b57,Namespace:calico-apiserver,Attempt:1,}" May 10 01:17:31.835333 systemd[1]: run-netns-cni\x2dba3355df\x2d5e7d\x2da773\x2d39f6\x2dd1fd20e1dea9.mount: Deactivated successfully. May 10 01:17:32.120337 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 01:17:32.120663 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic886ed48183: link becomes ready May 10 01:17:32.119886 systemd-networkd[1025]: calic886ed48183: Link UP May 10 01:17:32.121553 systemd-networkd[1025]: calic886ed48183: Gained carrier May 10 01:17:32.148007 env[1189]: 2025-05-10 01:17:31.899 [INFO][3755] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0 calico-apiserver-778fbb4795- calico-apiserver 4d3687fd-fc69-446e-87a9-b2f0538e94b3 826 0 2025-05-10 01:16:52 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:778fbb4795 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-2kvu9.gb1.brightbox.com calico-apiserver-778fbb4795-znbw9 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic886ed48183 [] []}} ContainerID="b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586" Namespace="calico-apiserver" Pod="calico-apiserver-778fbb4795-znbw9" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-" May 10 01:17:32.148007 env[1189]: 2025-05-10 01:17:31.899 [INFO][3755] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586" Namespace="calico-apiserver" Pod="calico-apiserver-778fbb4795-znbw9" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0" May 10 01:17:32.148007 env[1189]: 2025-05-10 01:17:31.979 [INFO][3783] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586" HandleID="k8s-pod-network.b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0" May 10 01:17:32.148007 env[1189]: 2025-05-10 01:17:31.994 [INFO][3783] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586" HandleID="k8s-pod-network.b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000315500), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-2kvu9.gb1.brightbox.com", "pod":"calico-apiserver-778fbb4795-znbw9", "timestamp":"2025-05-10 01:17:31.979044867 +0000 UTC"}, Hostname:"srv-2kvu9.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 01:17:32.148007 env[1189]: 2025-05-10 01:17:31.995 [INFO][3783] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:32.148007 env[1189]: 2025-05-10 01:17:31.995 [INFO][3783] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:32.148007 env[1189]: 2025-05-10 01:17:31.995 [INFO][3783] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-2kvu9.gb1.brightbox.com' May 10 01:17:32.148007 env[1189]: 2025-05-10 01:17:32.000 [INFO][3783] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:32.148007 env[1189]: 2025-05-10 01:17:32.010 [INFO][3783] ipam/ipam.go 372: Looking up existing affinities for host host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:32.148007 env[1189]: 2025-05-10 01:17:32.037 [INFO][3783] ipam/ipam.go 489: Trying affinity for 192.168.76.192/26 host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:32.148007 env[1189]: 2025-05-10 01:17:32.050 [INFO][3783] ipam/ipam.go 155: Attempting to load block cidr=192.168.76.192/26 host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:32.148007 env[1189]: 2025-05-10 01:17:32.066 [INFO][3783] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.192/26 host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:32.148007 env[1189]: 2025-05-10 01:17:32.066 [INFO][3783] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.192/26 handle="k8s-pod-network.b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:32.148007 env[1189]: 2025-05-10 01:17:32.069 [INFO][3783] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586 May 10 01:17:32.148007 env[1189]: 2025-05-10 01:17:32.076 [INFO][3783] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.76.192/26 handle="k8s-pod-network.b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:32.148007 env[1189]: 2025-05-10 01:17:32.095 [INFO][3783] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.76.195/26] block=192.168.76.192/26 handle="k8s-pod-network.b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:32.148007 env[1189]: 2025-05-10 01:17:32.095 [INFO][3783] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.195/26] handle="k8s-pod-network.b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:32.148007 env[1189]: 2025-05-10 01:17:32.096 [INFO][3783] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:32.148007 env[1189]: 2025-05-10 01:17:32.096 [INFO][3783] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.195/26] IPv6=[] ContainerID="b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586" HandleID="k8s-pod-network.b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0" May 10 01:17:32.149473 env[1189]: 2025-05-10 01:17:32.099 [INFO][3755] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586" Namespace="calico-apiserver" Pod="calico-apiserver-778fbb4795-znbw9" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0", GenerateName:"calico-apiserver-778fbb4795-", Namespace:"calico-apiserver", SelfLink:"", UID:"4d3687fd-fc69-446e-87a9-b2f0538e94b3", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"778fbb4795", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-778fbb4795-znbw9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic886ed48183", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:32.149473 env[1189]: 2025-05-10 01:17:32.099 [INFO][3755] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.76.195/32] ContainerID="b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586" Namespace="calico-apiserver" Pod="calico-apiserver-778fbb4795-znbw9" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0" May 10 01:17:32.149473 env[1189]: 2025-05-10 01:17:32.099 [INFO][3755] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic886ed48183 ContainerID="b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586" Namespace="calico-apiserver" Pod="calico-apiserver-778fbb4795-znbw9" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0" May 10 01:17:32.149473 env[1189]: 2025-05-10 01:17:32.124 [INFO][3755] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586" Namespace="calico-apiserver" Pod="calico-apiserver-778fbb4795-znbw9" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0" May 10 01:17:32.149473 env[1189]: 2025-05-10 01:17:32.125 [INFO][3755] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586" Namespace="calico-apiserver" Pod="calico-apiserver-778fbb4795-znbw9" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0", GenerateName:"calico-apiserver-778fbb4795-", Namespace:"calico-apiserver", SelfLink:"", UID:"4d3687fd-fc69-446e-87a9-b2f0538e94b3", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"778fbb4795", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586", Pod:"calico-apiserver-778fbb4795-znbw9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic886ed48183", MAC:"3a:42:59:b0:11:84", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:32.149473 env[1189]: 2025-05-10 01:17:32.144 [INFO][3755] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586" Namespace="calico-apiserver" Pod="calico-apiserver-778fbb4795-znbw9" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0" May 10 01:17:32.193000 audit[3809]: NETFILTER_CFG table=filter:106 family=2 entries=48 op=nft_register_chain pid=3809 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 01:17:32.193000 audit[3809]: SYSCALL arch=c000003e syscall=46 success=yes exit=25868 a0=3 a1=7ffda715c430 a2=0 a3=7ffda715c41c items=0 ppid=3246 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:32.193000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 01:17:32.207257 env[1189]: time="2025-05-10T01:17:32.207105775Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:17:32.207473 env[1189]: time="2025-05-10T01:17:32.207268631Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:17:32.207473 env[1189]: time="2025-05-10T01:17:32.207325812Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:17:32.207637 env[1189]: time="2025-05-10T01:17:32.207595283Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586 pid=3817 runtime=io.containerd.runc.v2 May 10 01:17:32.244141 systemd[1]: Started cri-containerd-b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586.scope. May 10 01:17:32.273678 systemd-networkd[1025]: cali0c6f5cc0db3: Link UP May 10 01:17:32.277124 systemd-networkd[1025]: cali0c6f5cc0db3: Gained carrier May 10 01:17:32.277761 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0c6f5cc0db3: link becomes ready May 10 01:17:32.296010 systemd-networkd[1025]: calia64f0b419fa: Gained IPv6LL May 10 01:17:32.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.318000 audit: BPF prog-id=176 op=LOAD May 10 01:17:32.320000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.320000 audit[3827]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3817 pid=3827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:32.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233353130333061306139316338623434386131623433386262616566 May 10 01:17:32.322000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.322000 audit[3827]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3817 pid=3827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:32.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233353130333061306139316338623434386131623433386262616566 May 10 01:17:32.323000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.323000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.323000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.323000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.323000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.323000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.323000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.323000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.323000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.323000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.323000 audit: BPF prog-id=177 op=LOAD May 10 01:17:32.323000 audit[3827]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00020a8a0 items=0 ppid=3817 pid=3827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:32.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233353130333061306139316338623434386131623433386262616566 May 10 01:17:32.330000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.330000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.330000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.330000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.330000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.330000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.330000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.330000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.330000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.330000 audit: BPF prog-id=178 op=LOAD May 10 01:17:32.330000 audit[3827]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00020a8e8 items=0 ppid=3817 pid=3827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:32.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233353130333061306139316338623434386131623433386262616566 May 10 01:17:32.331000 audit: BPF prog-id=178 op=UNLOAD May 10 01:17:32.331000 audit: BPF prog-id=177 op=UNLOAD May 10 01:17:32.332000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.332000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.332000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.332000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.332000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.332000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.332000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.332000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.332000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.332000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.332000 audit: BPF prog-id=179 op=LOAD May 10 01:17:32.332000 audit[3827]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00020acf8 items=0 ppid=3817 pid=3827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:32.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233353130333061306139316338623434386131623433386262616566 May 10 01:17:32.343091 env[1189]: 2025-05-10 01:17:31.934 [INFO][3766] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0 calico-apiserver-778fbb4795- calico-apiserver d62fc1e5-8a86-41aa-9230-dba166d93b57 827 0 2025-05-10 01:16:52 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:778fbb4795 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-2kvu9.gb1.brightbox.com calico-apiserver-778fbb4795-597wd eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0c6f5cc0db3 [] []}} ContainerID="69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022" Namespace="calico-apiserver" Pod="calico-apiserver-778fbb4795-597wd" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-" May 10 01:17:32.343091 env[1189]: 2025-05-10 01:17:31.934 [INFO][3766] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022" Namespace="calico-apiserver" Pod="calico-apiserver-778fbb4795-597wd" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0" May 10 01:17:32.343091 env[1189]: 2025-05-10 01:17:32.003 [INFO][3789] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022" HandleID="k8s-pod-network.69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0" May 10 01:17:32.343091 env[1189]: 2025-05-10 01:17:32.018 [INFO][3789] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022" HandleID="k8s-pod-network.69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000275730), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-2kvu9.gb1.brightbox.com", "pod":"calico-apiserver-778fbb4795-597wd", "timestamp":"2025-05-10 01:17:32.003518533 +0000 UTC"}, Hostname:"srv-2kvu9.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 01:17:32.343091 env[1189]: 2025-05-10 01:17:32.018 [INFO][3789] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:32.343091 env[1189]: 2025-05-10 01:17:32.098 [INFO][3789] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:32.343091 env[1189]: 2025-05-10 01:17:32.098 [INFO][3789] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-2kvu9.gb1.brightbox.com' May 10 01:17:32.343091 env[1189]: 2025-05-10 01:17:32.116 [INFO][3789] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:32.343091 env[1189]: 2025-05-10 01:17:32.134 [INFO][3789] ipam/ipam.go 372: Looking up existing affinities for host host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:32.343091 env[1189]: 2025-05-10 01:17:32.169 [INFO][3789] ipam/ipam.go 489: Trying affinity for 192.168.76.192/26 host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:32.343091 env[1189]: 2025-05-10 01:17:32.190 [INFO][3789] ipam/ipam.go 155: Attempting to load block cidr=192.168.76.192/26 host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:32.343091 env[1189]: 2025-05-10 01:17:32.207 [INFO][3789] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.192/26 host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:32.343091 env[1189]: 2025-05-10 01:17:32.207 [INFO][3789] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.192/26 handle="k8s-pod-network.69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:32.343091 env[1189]: 2025-05-10 01:17:32.211 [INFO][3789] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022 May 10 01:17:32.343091 env[1189]: 2025-05-10 01:17:32.220 [INFO][3789] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.76.192/26 handle="k8s-pod-network.69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:32.343091 env[1189]: 2025-05-10 01:17:32.255 [INFO][3789] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.76.196/26] block=192.168.76.192/26 handle="k8s-pod-network.69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:32.343091 env[1189]: 2025-05-10 01:17:32.255 [INFO][3789] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.196/26] handle="k8s-pod-network.69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:32.343091 env[1189]: 2025-05-10 01:17:32.255 [INFO][3789] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:32.343091 env[1189]: 2025-05-10 01:17:32.255 [INFO][3789] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.196/26] IPv6=[] ContainerID="69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022" HandleID="k8s-pod-network.69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0" May 10 01:17:32.344451 env[1189]: 2025-05-10 01:17:32.260 [INFO][3766] cni-plugin/k8s.go 386: Populated endpoint ContainerID="69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022" Namespace="calico-apiserver" Pod="calico-apiserver-778fbb4795-597wd" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0", GenerateName:"calico-apiserver-778fbb4795-", Namespace:"calico-apiserver", SelfLink:"", UID:"d62fc1e5-8a86-41aa-9230-dba166d93b57", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"778fbb4795", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-778fbb4795-597wd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0c6f5cc0db3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:32.344451 env[1189]: 2025-05-10 01:17:32.260 [INFO][3766] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.76.196/32] ContainerID="69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022" Namespace="calico-apiserver" Pod="calico-apiserver-778fbb4795-597wd" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0" May 10 01:17:32.344451 env[1189]: 2025-05-10 01:17:32.260 [INFO][3766] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0c6f5cc0db3 ContainerID="69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022" Namespace="calico-apiserver" Pod="calico-apiserver-778fbb4795-597wd" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0" May 10 01:17:32.344451 env[1189]: 2025-05-10 01:17:32.283 [INFO][3766] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022" Namespace="calico-apiserver" Pod="calico-apiserver-778fbb4795-597wd" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0" May 10 01:17:32.344451 env[1189]: 2025-05-10 01:17:32.287 [INFO][3766] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022" Namespace="calico-apiserver" Pod="calico-apiserver-778fbb4795-597wd" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0", GenerateName:"calico-apiserver-778fbb4795-", Namespace:"calico-apiserver", SelfLink:"", UID:"d62fc1e5-8a86-41aa-9230-dba166d93b57", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"778fbb4795", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022", Pod:"calico-apiserver-778fbb4795-597wd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0c6f5cc0db3", MAC:"62:8f:79:f3:a4:15", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:32.344451 env[1189]: 2025-05-10 01:17:32.322 [INFO][3766] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022" Namespace="calico-apiserver" Pod="calico-apiserver-778fbb4795-597wd" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0" May 10 01:17:32.364000 audit[3848]: NETFILTER_CFG table=filter:107 family=2 entries=42 op=nft_register_chain pid=3848 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 01:17:32.364000 audit[3848]: SYSCALL arch=c000003e syscall=46 success=yes exit=22704 a0=3 a1=7ffcb34f9310 a2=0 a3=7ffcb34f92fc items=0 ppid=3246 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:32.364000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 01:17:32.406780 env[1189]: time="2025-05-10T01:17:32.402648721Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-778fbb4795-znbw9,Uid:4d3687fd-fc69-446e-87a9-b2f0538e94b3,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586\"" May 10 01:17:32.421689 env[1189]: time="2025-05-10T01:17:32.421545755Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:17:32.421689 env[1189]: time="2025-05-10T01:17:32.421610547Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:17:32.422228 env[1189]: time="2025-05-10T01:17:32.421641336Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:17:32.422647 env[1189]: time="2025-05-10T01:17:32.422579087Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022 pid=3870 runtime=io.containerd.runc.v2 May 10 01:17:32.441746 systemd[1]: Started cri-containerd-69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022.scope. May 10 01:17:32.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.469000 audit: BPF prog-id=180 op=LOAD May 10 01:17:32.471000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.471000 audit[3881]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3870 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:32.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639663165303738326264383339386638356533393635313864393461 May 10 01:17:32.471000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.471000 audit[3881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3870 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:32.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639663165303738326264383339386638356533393635313864393461 May 10 01:17:32.471000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.471000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.471000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.471000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.471000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.471000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.471000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.471000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.471000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.471000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.471000 audit: BPF prog-id=181 op=LOAD May 10 01:17:32.471000 audit[3881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002fedb0 items=0 ppid=3870 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:32.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639663165303738326264383339386638356533393635313864393461 May 10 01:17:32.471000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.471000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.471000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.471000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.471000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.471000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.471000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.471000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.471000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.471000 audit: BPF prog-id=182 op=LOAD May 10 01:17:32.471000 audit[3881]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002fedf8 items=0 ppid=3870 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:32.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639663165303738326264383339386638356533393635313864393461 May 10 01:17:32.472000 audit: BPF prog-id=182 op=UNLOAD May 10 01:17:32.472000 audit: BPF prog-id=181 op=UNLOAD May 10 01:17:32.472000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.472000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.472000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.472000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.472000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.472000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.472000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.472000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.472000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.472000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:32.472000 audit: BPF prog-id=183 op=LOAD May 10 01:17:32.472000 audit[3881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002ff208 items=0 ppid=3870 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:32.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639663165303738326264383339386638356533393635313864393461 May 10 01:17:32.513101 env[1189]: time="2025-05-10T01:17:32.513036243Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-778fbb4795-597wd,Uid:d62fc1e5-8a86-41aa-9230-dba166d93b57,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022\"" May 10 01:17:33.384595 systemd-networkd[1025]: cali0c6f5cc0db3: Gained IPv6LL May 10 01:17:33.678000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:17:33.678000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:17:33.678000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002b26390 a2=fc6 a3=0 items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 key=(null) May 10 01:17:33.678000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:17:33.678000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024cbd40 a2=fc6 a3=0 items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 key=(null) May 10 01:17:33.678000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:17:33.960052 systemd-networkd[1025]: calic886ed48183: Gained IPv6LL May 10 01:17:34.724000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526356 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:17:34.724000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c007f87050 a2=fc6 a3=0 items=0 ppid=1725 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 key=(null) May 10 01:17:34.724000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31372E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 01:17:34.725000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:17:34.725000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c008cad7e0 a2=fc6 a3=0 items=0 ppid=1725 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 key=(null) May 10 01:17:34.725000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31372E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 01:17:34.726000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:17:34.726000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0080c0f90 a2=fc6 a3=0 items=0 ppid=1725 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 key=(null) May 10 01:17:34.726000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31372E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 01:17:34.753000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:17:34.753000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0080c1050 a2=fc6 a3=0 items=0 ppid=1725 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 key=(null) May 10 01:17:34.753000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31372E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 01:17:34.799000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:17:34.799000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0080c1080 a2=fc6 a3=0 items=0 ppid=1725 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 key=(null) May 10 01:17:34.799000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31372E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 01:17:34.810000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:17:34.810000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c008e14420 a2=fc6 a3=0 items=0 ppid=1725 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 key=(null) May 10 01:17:34.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31372E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 01:17:34.824863 env[1189]: time="2025-05-10T01:17:34.824780419Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:34.827950 env[1189]: time="2025-05-10T01:17:34.827913394Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:34.831000 env[1189]: time="2025-05-10T01:17:34.830958135Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:34.834889 env[1189]: time="2025-05-10T01:17:34.834170058Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:34.834889 env[1189]: time="2025-05-10T01:17:34.834582057Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 10 01:17:34.841589 env[1189]: time="2025-05-10T01:17:34.839966151Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 01:17:34.875343 env[1189]: time="2025-05-10T01:17:34.875264330Z" level=info msg="CreateContainer within sandbox \"8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 10 01:17:34.903312 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount405866557.mount: Deactivated successfully. May 10 01:17:34.907983 env[1189]: time="2025-05-10T01:17:34.907925868Z" level=info msg="CreateContainer within sandbox \"8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"5faa7124e48367631dcb969aff3b949d761b93f895b516d8557bbc72abd8642f\"" May 10 01:17:34.909465 env[1189]: time="2025-05-10T01:17:34.909382498Z" level=info msg="StartContainer for \"5faa7124e48367631dcb969aff3b949d761b93f895b516d8557bbc72abd8642f\"" May 10 01:17:34.957868 systemd[1]: Started cri-containerd-5faa7124e48367631dcb969aff3b949d761b93f895b516d8557bbc72abd8642f.scope. May 10 01:17:35.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.005000 audit: BPF prog-id=184 op=LOAD May 10 01:17:35.007000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3660 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:35.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566616137313234653438333637363331646362393639616666336239 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3660 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:35.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566616137313234653438333637363331646362393639616666336239 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit: BPF prog-id=185 op=LOAD May 10 01:17:35.007000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00028a520 items=0 ppid=3660 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:35.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566616137313234653438333637363331646362393639616666336239 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit: BPF prog-id=186 op=LOAD May 10 01:17:35.007000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00028a568 items=0 ppid=3660 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:35.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566616137313234653438333637363331646362393639616666336239 May 10 01:17:35.007000 audit: BPF prog-id=186 op=UNLOAD May 10 01:17:35.007000 audit: BPF prog-id=185 op=UNLOAD May 10 01:17:35.007000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:35.007000 audit: BPF prog-id=187 op=LOAD May 10 01:17:35.007000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00028a978 items=0 ppid=3660 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:35.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566616137313234653438333637363331646362393639616666336239 May 10 01:17:35.061668 env[1189]: time="2025-05-10T01:17:35.061599232Z" level=info msg="StartContainer for \"5faa7124e48367631dcb969aff3b949d761b93f895b516d8557bbc72abd8642f\" returns successfully" May 10 01:17:35.603442 env[1189]: time="2025-05-10T01:17:35.603382039Z" level=info msg="StopPodSandbox for \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\"" May 10 01:17:35.604004 env[1189]: time="2025-05-10T01:17:35.603583955Z" level=info msg="StopPodSandbox for \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\"" May 10 01:17:35.831775 env[1189]: 2025-05-10 01:17:35.717 [INFO][3969] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" May 10 01:17:35.831775 env[1189]: 2025-05-10 01:17:35.717 [INFO][3969] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" iface="eth0" netns="/var/run/netns/cni-38357350-5108-b0aa-d8f7-415bfad31edf" May 10 01:17:35.831775 env[1189]: 2025-05-10 01:17:35.717 [INFO][3969] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" iface="eth0" netns="/var/run/netns/cni-38357350-5108-b0aa-d8f7-415bfad31edf" May 10 01:17:35.831775 env[1189]: 2025-05-10 01:17:35.718 [INFO][3969] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" iface="eth0" netns="/var/run/netns/cni-38357350-5108-b0aa-d8f7-415bfad31edf" May 10 01:17:35.831775 env[1189]: 2025-05-10 01:17:35.718 [INFO][3969] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" May 10 01:17:35.831775 env[1189]: 2025-05-10 01:17:35.718 [INFO][3969] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" May 10 01:17:35.831775 env[1189]: 2025-05-10 01:17:35.798 [INFO][3978] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" HandleID="k8s-pod-network.6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" Workload="srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0" May 10 01:17:35.831775 env[1189]: 2025-05-10 01:17:35.799 [INFO][3978] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:35.831775 env[1189]: 2025-05-10 01:17:35.800 [INFO][3978] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:35.831775 env[1189]: 2025-05-10 01:17:35.821 [WARNING][3978] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" HandleID="k8s-pod-network.6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" Workload="srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0" May 10 01:17:35.831775 env[1189]: 2025-05-10 01:17:35.821 [INFO][3978] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" HandleID="k8s-pod-network.6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" Workload="srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0" May 10 01:17:35.831775 env[1189]: 2025-05-10 01:17:35.824 [INFO][3978] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:35.831775 env[1189]: 2025-05-10 01:17:35.828 [INFO][3969] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" May 10 01:17:35.834532 env[1189]: time="2025-05-10T01:17:35.833742592Z" level=info msg="TearDown network for sandbox \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\" successfully" May 10 01:17:35.834532 env[1189]: time="2025-05-10T01:17:35.833815080Z" level=info msg="StopPodSandbox for \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\" returns successfully" May 10 01:17:35.835549 env[1189]: time="2025-05-10T01:17:35.835500274Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xfs7c,Uid:828cc85f-6fb9-4e67-adff-af880ac7ed1f,Namespace:calico-system,Attempt:1,}" May 10 01:17:35.849379 env[1189]: 2025-05-10 01:17:35.738 [INFO][3962] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" May 10 01:17:35.849379 env[1189]: 2025-05-10 01:17:35.738 [INFO][3962] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" iface="eth0" netns="/var/run/netns/cni-9439877a-a18d-64f2-766f-7e7ca23e9bd4" May 10 01:17:35.849379 env[1189]: 2025-05-10 01:17:35.739 [INFO][3962] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" iface="eth0" netns="/var/run/netns/cni-9439877a-a18d-64f2-766f-7e7ca23e9bd4" May 10 01:17:35.849379 env[1189]: 2025-05-10 01:17:35.739 [INFO][3962] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" iface="eth0" netns="/var/run/netns/cni-9439877a-a18d-64f2-766f-7e7ca23e9bd4" May 10 01:17:35.849379 env[1189]: 2025-05-10 01:17:35.739 [INFO][3962] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" May 10 01:17:35.849379 env[1189]: 2025-05-10 01:17:35.739 [INFO][3962] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" May 10 01:17:35.849379 env[1189]: 2025-05-10 01:17:35.811 [INFO][3984] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" HandleID="k8s-pod-network.4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0" May 10 01:17:35.849379 env[1189]: 2025-05-10 01:17:35.814 [INFO][3984] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:35.849379 env[1189]: 2025-05-10 01:17:35.825 [INFO][3984] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:35.849379 env[1189]: 2025-05-10 01:17:35.839 [WARNING][3984] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" HandleID="k8s-pod-network.4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0" May 10 01:17:35.849379 env[1189]: 2025-05-10 01:17:35.839 [INFO][3984] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" HandleID="k8s-pod-network.4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0" May 10 01:17:35.849379 env[1189]: 2025-05-10 01:17:35.843 [INFO][3984] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:35.849379 env[1189]: 2025-05-10 01:17:35.847 [INFO][3962] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" May 10 01:17:35.850977 env[1189]: time="2025-05-10T01:17:35.849411720Z" level=info msg="TearDown network for sandbox \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\" successfully" May 10 01:17:35.850977 env[1189]: time="2025-05-10T01:17:35.849461818Z" level=info msg="StopPodSandbox for \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\" returns successfully" May 10 01:17:35.850977 env[1189]: time="2025-05-10T01:17:35.850505605Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-gzcsf,Uid:a8202034-330d-4ba1-b2a5-d033aec45ae4,Namespace:kube-system,Attempt:1,}" May 10 01:17:35.860287 systemd[1]: run-netns-cni\x2d38357350\x2d5108\x2db0aa\x2dd8f7\x2d415bfad31edf.mount: Deactivated successfully. May 10 01:17:35.860420 systemd[1]: run-netns-cni\x2d9439877a\x2da18d\x2d64f2\x2d766f\x2d7e7ca23e9bd4.mount: Deactivated successfully. May 10 01:17:36.188513 kubelet[1991]: I0510 01:17:36.187560 1991 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5bbd7d95bb-vwbw7" podStartSLOduration=39.585779972 podStartE2EDuration="43.187462726s" podCreationTimestamp="2025-05-10 01:16:53 +0000 UTC" firstStartedPulling="2025-05-10 01:17:31.237389733 +0000 UTC m=+51.977094800" lastFinishedPulling="2025-05-10 01:17:34.839072481 +0000 UTC m=+55.578777554" observedRunningTime="2025-05-10 01:17:35.975944799 +0000 UTC m=+56.715649874" watchObservedRunningTime="2025-05-10 01:17:36.187462726 +0000 UTC m=+56.927167793" May 10 01:17:36.237699 systemd-networkd[1025]: calicc61496249a: Link UP May 10 01:17:36.242300 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 01:17:36.242400 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicc61496249a: link becomes ready May 10 01:17:36.242167 systemd-networkd[1025]: calicc61496249a: Gained carrier May 10 01:17:36.276997 env[1189]: 2025-05-10 01:17:36.003 [INFO][3991] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0 csi-node-driver- calico-system 828cc85f-6fb9-4e67-adff-af880ac7ed1f 849 0 2025-05-10 01:16:52 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s srv-2kvu9.gb1.brightbox.com csi-node-driver-xfs7c eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calicc61496249a [] []}} ContainerID="f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174" Namespace="calico-system" Pod="csi-node-driver-xfs7c" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-" May 10 01:17:36.276997 env[1189]: 2025-05-10 01:17:36.003 [INFO][3991] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174" Namespace="calico-system" Pod="csi-node-driver-xfs7c" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0" May 10 01:17:36.276997 env[1189]: 2025-05-10 01:17:36.116 [INFO][4028] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174" HandleID="k8s-pod-network.f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174" Workload="srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0" May 10 01:17:36.276997 env[1189]: 2025-05-10 01:17:36.141 [INFO][4028] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174" HandleID="k8s-pod-network.f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174" Workload="srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002904b0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-2kvu9.gb1.brightbox.com", "pod":"csi-node-driver-xfs7c", "timestamp":"2025-05-10 01:17:36.116000902 +0000 UTC"}, Hostname:"srv-2kvu9.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 01:17:36.276997 env[1189]: 2025-05-10 01:17:36.142 [INFO][4028] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:36.276997 env[1189]: 2025-05-10 01:17:36.142 [INFO][4028] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:36.276997 env[1189]: 2025-05-10 01:17:36.142 [INFO][4028] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-2kvu9.gb1.brightbox.com' May 10 01:17:36.276997 env[1189]: 2025-05-10 01:17:36.153 [INFO][4028] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:36.276997 env[1189]: 2025-05-10 01:17:36.179 [INFO][4028] ipam/ipam.go 372: Looking up existing affinities for host host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:36.276997 env[1189]: 2025-05-10 01:17:36.198 [INFO][4028] ipam/ipam.go 489: Trying affinity for 192.168.76.192/26 host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:36.276997 env[1189]: 2025-05-10 01:17:36.202 [INFO][4028] ipam/ipam.go 155: Attempting to load block cidr=192.168.76.192/26 host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:36.276997 env[1189]: 2025-05-10 01:17:36.208 [INFO][4028] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.192/26 host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:36.276997 env[1189]: 2025-05-10 01:17:36.208 [INFO][4028] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.192/26 handle="k8s-pod-network.f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:36.276997 env[1189]: 2025-05-10 01:17:36.212 [INFO][4028] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174 May 10 01:17:36.276997 env[1189]: 2025-05-10 01:17:36.219 [INFO][4028] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.76.192/26 handle="k8s-pod-network.f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:36.276997 env[1189]: 2025-05-10 01:17:36.227 [INFO][4028] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.76.197/26] block=192.168.76.192/26 handle="k8s-pod-network.f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:36.276997 env[1189]: 2025-05-10 01:17:36.227 [INFO][4028] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.197/26] handle="k8s-pod-network.f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:36.276997 env[1189]: 2025-05-10 01:17:36.227 [INFO][4028] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:36.276997 env[1189]: 2025-05-10 01:17:36.227 [INFO][4028] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.197/26] IPv6=[] ContainerID="f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174" HandleID="k8s-pod-network.f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174" Workload="srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0" May 10 01:17:36.278536 env[1189]: 2025-05-10 01:17:36.230 [INFO][3991] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174" Namespace="calico-system" Pod="csi-node-driver-xfs7c" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"828cc85f-6fb9-4e67-adff-af880ac7ed1f", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"", Pod:"csi-node-driver-xfs7c", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calicc61496249a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:36.278536 env[1189]: 2025-05-10 01:17:36.230 [INFO][3991] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.76.197/32] ContainerID="f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174" Namespace="calico-system" Pod="csi-node-driver-xfs7c" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0" May 10 01:17:36.278536 env[1189]: 2025-05-10 01:17:36.230 [INFO][3991] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicc61496249a ContainerID="f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174" Namespace="calico-system" Pod="csi-node-driver-xfs7c" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0" May 10 01:17:36.278536 env[1189]: 2025-05-10 01:17:36.243 [INFO][3991] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174" Namespace="calico-system" Pod="csi-node-driver-xfs7c" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0" May 10 01:17:36.278536 env[1189]: 2025-05-10 01:17:36.245 [INFO][3991] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174" Namespace="calico-system" Pod="csi-node-driver-xfs7c" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"828cc85f-6fb9-4e67-adff-af880ac7ed1f", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174", Pod:"csi-node-driver-xfs7c", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calicc61496249a", MAC:"ee:00:57:07:a3:1d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:36.278536 env[1189]: 2025-05-10 01:17:36.266 [INFO][3991] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174" Namespace="calico-system" Pod="csi-node-driver-xfs7c" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0" May 10 01:17:36.389059 systemd-networkd[1025]: cali2103c655fb4: Link UP May 10 01:17:36.392755 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2103c655fb4: link becomes ready May 10 01:17:36.392974 systemd-networkd[1025]: cali2103c655fb4: Gained carrier May 10 01:17:36.421140 env[1189]: 2025-05-10 01:17:36.068 [INFO][3999] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0 coredns-6f6b679f8f- kube-system a8202034-330d-4ba1-b2a5-d033aec45ae4 850 0 2025-05-10 01:16:44 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-2kvu9.gb1.brightbox.com coredns-6f6b679f8f-gzcsf eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2103c655fb4 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167" Namespace="kube-system" Pod="coredns-6f6b679f8f-gzcsf" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-" May 10 01:17:36.421140 env[1189]: 2025-05-10 01:17:36.068 [INFO][3999] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167" Namespace="kube-system" Pod="coredns-6f6b679f8f-gzcsf" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0" May 10 01:17:36.421140 env[1189]: 2025-05-10 01:17:36.182 [INFO][4039] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167" HandleID="k8s-pod-network.3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0" May 10 01:17:36.421140 env[1189]: 2025-05-10 01:17:36.259 [INFO][4039] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167" HandleID="k8s-pod-network.3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000fd4e0), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-2kvu9.gb1.brightbox.com", "pod":"coredns-6f6b679f8f-gzcsf", "timestamp":"2025-05-10 01:17:36.18207473 +0000 UTC"}, Hostname:"srv-2kvu9.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 01:17:36.421140 env[1189]: 2025-05-10 01:17:36.259 [INFO][4039] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:36.421140 env[1189]: 2025-05-10 01:17:36.259 [INFO][4039] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:36.421140 env[1189]: 2025-05-10 01:17:36.259 [INFO][4039] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-2kvu9.gb1.brightbox.com' May 10 01:17:36.421140 env[1189]: 2025-05-10 01:17:36.270 [INFO][4039] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:36.421140 env[1189]: 2025-05-10 01:17:36.335 [INFO][4039] ipam/ipam.go 372: Looking up existing affinities for host host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:36.421140 env[1189]: 2025-05-10 01:17:36.347 [INFO][4039] ipam/ipam.go 489: Trying affinity for 192.168.76.192/26 host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:36.421140 env[1189]: 2025-05-10 01:17:36.356 [INFO][4039] ipam/ipam.go 155: Attempting to load block cidr=192.168.76.192/26 host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:36.421140 env[1189]: 2025-05-10 01:17:36.361 [INFO][4039] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.192/26 host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:36.421140 env[1189]: 2025-05-10 01:17:36.361 [INFO][4039] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.192/26 handle="k8s-pod-network.3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:36.421140 env[1189]: 2025-05-10 01:17:36.364 [INFO][4039] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167 May 10 01:17:36.421140 env[1189]: 2025-05-10 01:17:36.371 [INFO][4039] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.76.192/26 handle="k8s-pod-network.3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:36.421140 env[1189]: 2025-05-10 01:17:36.381 [INFO][4039] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.76.198/26] block=192.168.76.192/26 handle="k8s-pod-network.3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:36.421140 env[1189]: 2025-05-10 01:17:36.381 [INFO][4039] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.198/26] handle="k8s-pod-network.3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167" host="srv-2kvu9.gb1.brightbox.com" May 10 01:17:36.421140 env[1189]: 2025-05-10 01:17:36.381 [INFO][4039] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:36.421140 env[1189]: 2025-05-10 01:17:36.381 [INFO][4039] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.198/26] IPv6=[] ContainerID="3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167" HandleID="k8s-pod-network.3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0" May 10 01:17:36.433225 env[1189]: 2025-05-10 01:17:36.385 [INFO][3999] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167" Namespace="kube-system" Pod="coredns-6f6b679f8f-gzcsf" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"a8202034-330d-4ba1-b2a5-d033aec45ae4", ResourceVersion:"850", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"", Pod:"coredns-6f6b679f8f-gzcsf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2103c655fb4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:36.433225 env[1189]: 2025-05-10 01:17:36.385 [INFO][3999] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.76.198/32] ContainerID="3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167" Namespace="kube-system" Pod="coredns-6f6b679f8f-gzcsf" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0" May 10 01:17:36.433225 env[1189]: 2025-05-10 01:17:36.385 [INFO][3999] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2103c655fb4 ContainerID="3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167" Namespace="kube-system" Pod="coredns-6f6b679f8f-gzcsf" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0" May 10 01:17:36.433225 env[1189]: 2025-05-10 01:17:36.393 [INFO][3999] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167" Namespace="kube-system" Pod="coredns-6f6b679f8f-gzcsf" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0" May 10 01:17:36.433225 env[1189]: 2025-05-10 01:17:36.394 [INFO][3999] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167" Namespace="kube-system" Pod="coredns-6f6b679f8f-gzcsf" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"a8202034-330d-4ba1-b2a5-d033aec45ae4", ResourceVersion:"850", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167", Pod:"coredns-6f6b679f8f-gzcsf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2103c655fb4", MAC:"32:2e:f3:18:0f:aa", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:36.433225 env[1189]: 2025-05-10 01:17:36.417 [INFO][3999] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167" Namespace="kube-system" Pod="coredns-6f6b679f8f-gzcsf" WorkloadEndpoint="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0" May 10 01:17:36.460859 env[1189]: time="2025-05-10T01:17:36.460408049Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:17:36.460859 env[1189]: time="2025-05-10T01:17:36.460475535Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:17:36.460859 env[1189]: time="2025-05-10T01:17:36.460493432Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:17:36.461496 env[1189]: time="2025-05-10T01:17:36.460661649Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174 pid=4089 runtime=io.containerd.runc.v2 May 10 01:17:36.483600 env[1189]: time="2025-05-10T01:17:36.483447584Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:17:36.483928 env[1189]: time="2025-05-10T01:17:36.483878365Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:17:36.484108 env[1189]: time="2025-05-10T01:17:36.484055951Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:17:36.486210 env[1189]: time="2025-05-10T01:17:36.485875646Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167 pid=4097 runtime=io.containerd.runc.v2 May 10 01:17:36.502253 systemd[1]: Started cri-containerd-f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174.scope. May 10 01:17:36.542389 systemd[1]: Started cri-containerd-3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167.scope. May 10 01:17:36.601615 kernel: kauditd_printk_skb: 251 callbacks suppressed May 10 01:17:36.601800 kernel: audit: type=1400 audit(1746839856.594:1264): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.604226 kernel: audit: type=1400 audit(1746839856.594:1265): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.618886 kernel: audit: type=1400 audit(1746839856.594:1266): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.618979 kernel: audit: type=1400 audit(1746839856.594:1267): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.619049 kernel: audit: type=1400 audit(1746839856.594:1268): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.631771 kernel: audit: type=1400 audit(1746839856.594:1269): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.640763 kernel: audit: type=1400 audit(1746839856.594:1270): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.640842 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 01:17:36.648247 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 10 01:17:36.648348 kernel: audit: type=1400 audit(1746839856.594:1271): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.603000 audit: BPF prog-id=188 op=LOAD May 10 01:17:36.608000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.608000 audit[4122]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4097 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:36.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365303566653838653465613939653731356431653038633763623339 May 10 01:17:36.608000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.608000 audit[4122]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4097 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:36.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365303566653838653465613939653731356431653038633763623339 May 10 01:17:36.608000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.608000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.608000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.608000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.608000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.608000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.608000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.608000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.608000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.608000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.608000 audit: BPF prog-id=189 op=LOAD May 10 01:17:36.608000 audit[4122]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002241e0 items=0 ppid=4097 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:36.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365303566653838653465613939653731356431653038633763623339 May 10 01:17:36.618000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.618000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.618000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.618000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.618000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.618000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.618000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.618000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.626000 audit[4151]: NETFILTER_CFG table=filter:108 family=2 entries=74 op=nft_register_chain pid=4151 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 01:17:36.626000 audit[4151]: SYSCALL arch=c000003e syscall=46 success=yes exit=39188 a0=3 a1=7fffa59efdb0 a2=0 a3=7fffa59efd9c items=0 ppid=3246 pid=4151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:36.626000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 01:17:36.618000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.618000 audit: BPF prog-id=190 op=LOAD May 10 01:17:36.618000 audit[4122]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000224228 items=0 ppid=4097 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:36.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365303566653838653465613939653731356431653038633763623339 May 10 01:17:36.630000 audit: BPF prog-id=190 op=UNLOAD May 10 01:17:36.630000 audit: BPF prog-id=189 op=UNLOAD May 10 01:17:36.630000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.630000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.630000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.630000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.630000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.630000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.630000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.630000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.630000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.630000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.630000 audit: BPF prog-id=191 op=LOAD May 10 01:17:36.630000 audit[4122]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000224638 items=0 ppid=4097 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:36.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365303566653838653465613939653731356431653038633763623339 May 10 01:17:36.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.649000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.649000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4089 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:36.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632346535633865633464613963656361333139646334663365383666 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit: BPF prog-id=193 op=LOAD May 10 01:17:36.652000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028d2a0 items=0 ppid=4089 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:36.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632346535633865633464613963656361333139646334663365383666 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit: BPF prog-id=194 op=LOAD May 10 01:17:36.652000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028d2e8 items=0 ppid=4089 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:36.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632346535633865633464613963656361333139646334663365383666 May 10 01:17:36.652000 audit: BPF prog-id=194 op=UNLOAD May 10 01:17:36.652000 audit: BPF prog-id=193 op=UNLOAD May 10 01:17:36.652000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.652000 audit: BPF prog-id=195 op=LOAD May 10 01:17:36.652000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028d6f8 items=0 ppid=4089 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:36.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632346535633865633464613963656361333139646334663365383666 May 10 01:17:36.698464 env[1189]: time="2025-05-10T01:17:36.698389118Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xfs7c,Uid:828cc85f-6fb9-4e67-adff-af880ac7ed1f,Namespace:calico-system,Attempt:1,} returns sandbox id \"f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174\"" May 10 01:17:36.750293 env[1189]: time="2025-05-10T01:17:36.750230059Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-gzcsf,Uid:a8202034-330d-4ba1-b2a5-d033aec45ae4,Namespace:kube-system,Attempt:1,} returns sandbox id \"3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167\"" May 10 01:17:36.763962 env[1189]: time="2025-05-10T01:17:36.763831335Z" level=info msg="CreateContainer within sandbox \"3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 01:17:36.790106 env[1189]: time="2025-05-10T01:17:36.789079981Z" level=info msg="CreateContainer within sandbox \"3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"9e4735a6813e28047d82fbe45c1f4d1f7479e8f912b02d7482bc6880744d14c0\"" May 10 01:17:36.793593 env[1189]: time="2025-05-10T01:17:36.792894968Z" level=info msg="StartContainer for \"9e4735a6813e28047d82fbe45c1f4d1f7479e8f912b02d7482bc6880744d14c0\"" May 10 01:17:36.825573 systemd[1]: Started cri-containerd-9e4735a6813e28047d82fbe45c1f4d1f7479e8f912b02d7482bc6880744d14c0.scope. May 10 01:17:36.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.872000 audit: BPF prog-id=196 op=LOAD May 10 01:17:36.873000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4097 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:36.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965343733356136383133653238303437643832666265343563316634 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4097 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:36.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965343733356136383133653238303437643832666265343563316634 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit: BPF prog-id=197 op=LOAD May 10 01:17:36.873000 audit[4171]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001690e0 items=0 ppid=4097 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:36.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965343733356136383133653238303437643832666265343563316634 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit: BPF prog-id=198 op=LOAD May 10 01:17:36.873000 audit[4171]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000169128 items=0 ppid=4097 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:36.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965343733356136383133653238303437643832666265343563316634 May 10 01:17:36.873000 audit: BPF prog-id=198 op=UNLOAD May 10 01:17:36.873000 audit: BPF prog-id=197 op=UNLOAD May 10 01:17:36.873000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:36.873000 audit: BPF prog-id=199 op=LOAD May 10 01:17:36.873000 audit[4171]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000169538 items=0 ppid=4097 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:36.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965343733356136383133653238303437643832666265343563316634 May 10 01:17:36.915226 env[1189]: time="2025-05-10T01:17:36.915158500Z" level=info msg="StartContainer for \"9e4735a6813e28047d82fbe45c1f4d1f7479e8f912b02d7482bc6880744d14c0\" returns successfully" May 10 01:17:36.999691 kubelet[1991]: I0510 01:17:36.999607 1991 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-gzcsf" podStartSLOduration=52.999563191 podStartE2EDuration="52.999563191s" podCreationTimestamp="2025-05-10 01:16:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 01:17:36.993581573 +0000 UTC m=+57.733286665" watchObservedRunningTime="2025-05-10 01:17:36.999563191 +0000 UTC m=+57.739268258" May 10 01:17:37.059000 audit[4202]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=4202 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:17:37.059000 audit[4202]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe76b52850 a2=0 a3=7ffe76b5283c items=0 ppid=2163 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:37.059000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:17:37.076000 audit[4202]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=4202 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:17:37.076000 audit[4202]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe76b52850 a2=0 a3=7ffe76b5283c items=0 ppid=2163 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:37.076000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:17:37.864167 systemd-networkd[1025]: cali2103c655fb4: Gained IPv6LL May 10 01:17:38.079000 audit[4204]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:17:38.079000 audit[4204]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc025afa50 a2=0 a3=7ffc025afa3c items=0 ppid=2163 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:38.079000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:17:38.102000 audit[4204]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=4204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:17:38.102000 audit[4204]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffc025afa50 a2=0 a3=7ffc025afa3c items=0 ppid=2163 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:38.102000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:17:38.120167 systemd-networkd[1025]: calicc61496249a: Gained IPv6LL May 10 01:17:39.364000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:17:39.364000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011a4d20 a2=fc6 a3=0 items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 key=(null) May 10 01:17:39.364000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:17:39.382000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:17:39.382000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002b21de0 a2=fc6 a3=0 items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 key=(null) May 10 01:17:39.382000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:17:39.391000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:17:39.391000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0011a4d40 a2=fc6 a3=0 items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 key=(null) May 10 01:17:39.391000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:17:39.399000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:17:39.399000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b21f80 a2=fc6 a3=0 items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 key=(null) May 10 01:17:39.399000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:17:39.555726 systemd[1]: run-containerd-runc-k8s.io-5faa7124e48367631dcb969aff3b949d761b93f895b516d8557bbc72abd8642f-runc.PBK31U.mount: Deactivated successfully. May 10 01:17:39.666367 env[1189]: time="2025-05-10T01:17:39.666193305Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:39.668917 env[1189]: time="2025-05-10T01:17:39.668852061Z" level=info msg="StopPodSandbox for \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\"" May 10 01:17:39.670391 env[1189]: time="2025-05-10T01:17:39.670354297Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:39.679518 env[1189]: time="2025-05-10T01:17:39.679476071Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:39.681197 env[1189]: time="2025-05-10T01:17:39.681161010Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:39.682100 env[1189]: time="2025-05-10T01:17:39.681919764Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 01:17:39.684850 env[1189]: time="2025-05-10T01:17:39.684814030Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 01:17:39.690732 env[1189]: time="2025-05-10T01:17:39.690669488Z" level=info msg="CreateContainer within sandbox \"b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 01:17:39.717202 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1610468405.mount: Deactivated successfully. May 10 01:17:39.724905 env[1189]: time="2025-05-10T01:17:39.724833492Z" level=info msg="CreateContainer within sandbox \"b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"10c8740b61a8e8d39871f34b0bbdbcd8797eb8380fa7521ae0e2b74cdc9c785a\"" May 10 01:17:39.728267 env[1189]: time="2025-05-10T01:17:39.728196917Z" level=info msg="StartContainer for \"10c8740b61a8e8d39871f34b0bbdbcd8797eb8380fa7521ae0e2b74cdc9c785a\"" May 10 01:17:39.844326 systemd[1]: Started cri-containerd-10c8740b61a8e8d39871f34b0bbdbcd8797eb8380fa7521ae0e2b74cdc9c785a.scope. May 10 01:17:39.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.981000 audit: BPF prog-id=200 op=LOAD May 10 01:17:39.983000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.983000 audit[4256]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3817 pid=4256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:39.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633837343062363161386538643339383731663334623062626462 May 10 01:17:39.984000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.984000 audit[4256]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3817 pid=4256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:39.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633837343062363161386538643339383731663334623062626462 May 10 01:17:39.985000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.985000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.985000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.985000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.985000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.985000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.985000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.985000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.985000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.985000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.985000 audit: BPF prog-id=201 op=LOAD May 10 01:17:39.985000 audit[4256]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002ff560 items=0 ppid=3817 pid=4256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:39.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633837343062363161386538643339383731663334623062626462 May 10 01:17:39.986000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.986000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.986000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.986000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.986000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.986000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.986000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.986000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.986000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.986000 audit: BPF prog-id=202 op=LOAD May 10 01:17:39.986000 audit[4256]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002ff5a8 items=0 ppid=3817 pid=4256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:39.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633837343062363161386538643339383731663334623062626462 May 10 01:17:39.987000 audit: BPF prog-id=202 op=UNLOAD May 10 01:17:39.987000 audit: BPF prog-id=201 op=UNLOAD May 10 01:17:39.988000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.988000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.988000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.988000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.988000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.988000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.988000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.988000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.988000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.988000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:39.988000 audit: BPF prog-id=203 op=LOAD May 10 01:17:39.988000 audit[4256]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002ff9b8 items=0 ppid=3817 pid=4256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:39.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633837343062363161386538643339383731663334623062626462 May 10 01:17:40.005195 env[1189]: 2025-05-10 01:17:39.900 [WARNING][4244] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0", GenerateName:"calico-kube-controllers-5bbd7d95bb-", Namespace:"calico-system", SelfLink:"", UID:"3b8a75fb-e300-4c19-b234-964ddae047ca", ResourceVersion:"855", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5bbd7d95bb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11", Pod:"calico-kube-controllers-5bbd7d95bb-vwbw7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.76.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia64f0b419fa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:40.005195 env[1189]: 2025-05-10 01:17:39.901 [INFO][4244] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" May 10 01:17:40.005195 env[1189]: 2025-05-10 01:17:39.901 [INFO][4244] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" iface="eth0" netns="" May 10 01:17:40.005195 env[1189]: 2025-05-10 01:17:39.901 [INFO][4244] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" May 10 01:17:40.005195 env[1189]: 2025-05-10 01:17:39.901 [INFO][4244] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" May 10 01:17:40.005195 env[1189]: 2025-05-10 01:17:39.954 [INFO][4272] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" HandleID="k8s-pod-network.e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0" May 10 01:17:40.005195 env[1189]: 2025-05-10 01:17:39.955 [INFO][4272] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:40.005195 env[1189]: 2025-05-10 01:17:39.955 [INFO][4272] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:40.005195 env[1189]: 2025-05-10 01:17:39.993 [WARNING][4272] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" HandleID="k8s-pod-network.e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0" May 10 01:17:40.005195 env[1189]: 2025-05-10 01:17:39.993 [INFO][4272] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" HandleID="k8s-pod-network.e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0" May 10 01:17:40.005195 env[1189]: 2025-05-10 01:17:39.999 [INFO][4272] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:40.005195 env[1189]: 2025-05-10 01:17:40.003 [INFO][4244] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" May 10 01:17:40.006339 env[1189]: time="2025-05-10T01:17:40.005255470Z" level=info msg="TearDown network for sandbox \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\" successfully" May 10 01:17:40.006339 env[1189]: time="2025-05-10T01:17:40.005329114Z" level=info msg="StopPodSandbox for \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\" returns successfully" May 10 01:17:40.051652 env[1189]: time="2025-05-10T01:17:40.051591019Z" level=info msg="RemovePodSandbox for \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\"" May 10 01:17:40.052462 env[1189]: time="2025-05-10T01:17:40.052360370Z" level=info msg="Forcibly stopping sandbox \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\"" May 10 01:17:40.065651 env[1189]: time="2025-05-10T01:17:40.065595853Z" level=info msg="StartContainer for \"10c8740b61a8e8d39871f34b0bbdbcd8797eb8380fa7521ae0e2b74cdc9c785a\" returns successfully" May 10 01:17:40.067261 env[1189]: time="2025-05-10T01:17:40.067211545Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:40.070489 env[1189]: time="2025-05-10T01:17:40.070450043Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:40.076972 env[1189]: time="2025-05-10T01:17:40.076924884Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:40.080085 env[1189]: time="2025-05-10T01:17:40.080046920Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:40.080567 env[1189]: time="2025-05-10T01:17:40.080526566Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 01:17:40.083665 env[1189]: time="2025-05-10T01:17:40.083628787Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 10 01:17:40.085264 env[1189]: time="2025-05-10T01:17:40.085220206Z" level=info msg="CreateContainer within sandbox \"69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 01:17:40.098509 env[1189]: time="2025-05-10T01:17:40.098450585Z" level=info msg="CreateContainer within sandbox \"69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"6919adc1c9bacd51387c7fd2202b22d4384722c06b211d43fb0dffa87a0c92c8\"" May 10 01:17:40.099644 env[1189]: time="2025-05-10T01:17:40.099608033Z" level=info msg="StartContainer for \"6919adc1c9bacd51387c7fd2202b22d4384722c06b211d43fb0dffa87a0c92c8\"" May 10 01:17:40.227820 systemd[1]: Started cri-containerd-6919adc1c9bacd51387c7fd2202b22d4384722c06b211d43fb0dffa87a0c92c8.scope. May 10 01:17:40.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.289000 audit: BPF prog-id=204 op=LOAD May 10 01:17:40.294000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.294000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3870 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:40.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639313961646331633962616364353133383763376664323230326232 May 10 01:17:40.294000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.294000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3870 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:40.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639313961646331633962616364353133383763376664323230326232 May 10 01:17:40.294000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.294000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.294000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.294000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.294000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.294000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.294000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.294000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.294000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.294000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.294000 audit: BPF prog-id=205 op=LOAD May 10 01:17:40.294000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003091d0 items=0 ppid=3870 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:40.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639313961646331633962616364353133383763376664323230326232 May 10 01:17:40.294000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.294000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.294000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.294000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.294000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.294000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.294000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.294000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.294000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.294000 audit: BPF prog-id=206 op=LOAD May 10 01:17:40.294000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000309218 items=0 ppid=3870 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:40.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639313961646331633962616364353133383763376664323230326232 May 10 01:17:40.294000 audit: BPF prog-id=206 op=UNLOAD May 10 01:17:40.295000 audit: BPF prog-id=205 op=UNLOAD May 10 01:17:40.295000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.295000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.295000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.295000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.295000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.295000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.295000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.295000 audit[4320]: AVC avc: denied { perfmon } for pid=4320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.295000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.295000 audit[4320]: AVC avc: denied { bpf } for pid=4320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:40.295000 audit: BPF prog-id=207 op=LOAD May 10 01:17:40.295000 audit[4320]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000309628 items=0 ppid=3870 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:40.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639313961646331633962616364353133383763376664323230326232 May 10 01:17:40.331758 env[1189]: 2025-05-10 01:17:40.242 [WARNING][4304] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0", GenerateName:"calico-kube-controllers-5bbd7d95bb-", Namespace:"calico-system", SelfLink:"", UID:"3b8a75fb-e300-4c19-b234-964ddae047ca", ResourceVersion:"855", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5bbd7d95bb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"8d7c0066c718e8d4b0d3d64ab7696d123a98feddd85657f785b1e0054f552c11", Pod:"calico-kube-controllers-5bbd7d95bb-vwbw7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.76.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia64f0b419fa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:40.331758 env[1189]: 2025-05-10 01:17:40.243 [INFO][4304] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" May 10 01:17:40.331758 env[1189]: 2025-05-10 01:17:40.243 [INFO][4304] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" iface="eth0" netns="" May 10 01:17:40.331758 env[1189]: 2025-05-10 01:17:40.243 [INFO][4304] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" May 10 01:17:40.331758 env[1189]: 2025-05-10 01:17:40.243 [INFO][4304] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" May 10 01:17:40.331758 env[1189]: 2025-05-10 01:17:40.307 [INFO][4333] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" HandleID="k8s-pod-network.e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0" May 10 01:17:40.331758 env[1189]: 2025-05-10 01:17:40.307 [INFO][4333] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:40.331758 env[1189]: 2025-05-10 01:17:40.307 [INFO][4333] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:40.331758 env[1189]: 2025-05-10 01:17:40.324 [WARNING][4333] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" HandleID="k8s-pod-network.e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0" May 10 01:17:40.331758 env[1189]: 2025-05-10 01:17:40.325 [INFO][4333] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" HandleID="k8s-pod-network.e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--kube--controllers--5bbd7d95bb--vwbw7-eth0" May 10 01:17:40.331758 env[1189]: 2025-05-10 01:17:40.327 [INFO][4333] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:40.331758 env[1189]: 2025-05-10 01:17:40.330 [INFO][4304] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9" May 10 01:17:40.333005 env[1189]: time="2025-05-10T01:17:40.332950046Z" level=info msg="TearDown network for sandbox \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\" successfully" May 10 01:17:40.338529 env[1189]: time="2025-05-10T01:17:40.338455358Z" level=info msg="RemovePodSandbox \"e26ec9b8d813475ee85b69dce5a5a65a26e751f169e3fb79fe25481349e62ad9\" returns successfully" May 10 01:17:40.341617 env[1189]: time="2025-05-10T01:17:40.341578096Z" level=info msg="StopPodSandbox for \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\"" May 10 01:17:40.410413 env[1189]: time="2025-05-10T01:17:40.410342330Z" level=info msg="StartContainer for \"6919adc1c9bacd51387c7fd2202b22d4384722c06b211d43fb0dffa87a0c92c8\" returns successfully" May 10 01:17:40.521000 env[1189]: 2025-05-10 01:17:40.440 [WARNING][4358] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0", GenerateName:"calico-apiserver-778fbb4795-", Namespace:"calico-apiserver", SelfLink:"", UID:"4d3687fd-fc69-446e-87a9-b2f0538e94b3", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"778fbb4795", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586", Pod:"calico-apiserver-778fbb4795-znbw9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic886ed48183", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:40.521000 env[1189]: 2025-05-10 01:17:40.441 [INFO][4358] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" May 10 01:17:40.521000 env[1189]: 2025-05-10 01:17:40.441 [INFO][4358] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" iface="eth0" netns="" May 10 01:17:40.521000 env[1189]: 2025-05-10 01:17:40.441 [INFO][4358] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" May 10 01:17:40.521000 env[1189]: 2025-05-10 01:17:40.441 [INFO][4358] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" May 10 01:17:40.521000 env[1189]: 2025-05-10 01:17:40.504 [INFO][4375] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" HandleID="k8s-pod-network.22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0" May 10 01:17:40.521000 env[1189]: 2025-05-10 01:17:40.505 [INFO][4375] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:40.521000 env[1189]: 2025-05-10 01:17:40.505 [INFO][4375] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:40.521000 env[1189]: 2025-05-10 01:17:40.514 [WARNING][4375] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" HandleID="k8s-pod-network.22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0" May 10 01:17:40.521000 env[1189]: 2025-05-10 01:17:40.514 [INFO][4375] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" HandleID="k8s-pod-network.22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0" May 10 01:17:40.521000 env[1189]: 2025-05-10 01:17:40.516 [INFO][4375] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:40.521000 env[1189]: 2025-05-10 01:17:40.519 [INFO][4358] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" May 10 01:17:40.522443 env[1189]: time="2025-05-10T01:17:40.521553426Z" level=info msg="TearDown network for sandbox \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\" successfully" May 10 01:17:40.522443 env[1189]: time="2025-05-10T01:17:40.521647026Z" level=info msg="StopPodSandbox for \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\" returns successfully" May 10 01:17:40.523206 env[1189]: time="2025-05-10T01:17:40.523169983Z" level=info msg="RemovePodSandbox for \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\"" May 10 01:17:40.523426 env[1189]: time="2025-05-10T01:17:40.523371470Z" level=info msg="Forcibly stopping sandbox \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\"" May 10 01:17:40.694262 env[1189]: 2025-05-10 01:17:40.625 [WARNING][4395] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0", GenerateName:"calico-apiserver-778fbb4795-", Namespace:"calico-apiserver", SelfLink:"", UID:"4d3687fd-fc69-446e-87a9-b2f0538e94b3", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"778fbb4795", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"b351030a0a91c8b448a1b438bbaef30eb424bb0eb63cb6f837a96c9bd8b87586", Pod:"calico-apiserver-778fbb4795-znbw9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic886ed48183", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:40.694262 env[1189]: 2025-05-10 01:17:40.625 [INFO][4395] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" May 10 01:17:40.694262 env[1189]: 2025-05-10 01:17:40.625 [INFO][4395] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" iface="eth0" netns="" May 10 01:17:40.694262 env[1189]: 2025-05-10 01:17:40.625 [INFO][4395] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" May 10 01:17:40.694262 env[1189]: 2025-05-10 01:17:40.625 [INFO][4395] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" May 10 01:17:40.694262 env[1189]: 2025-05-10 01:17:40.670 [INFO][4406] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" HandleID="k8s-pod-network.22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0" May 10 01:17:40.694262 env[1189]: 2025-05-10 01:17:40.671 [INFO][4406] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:40.694262 env[1189]: 2025-05-10 01:17:40.671 [INFO][4406] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:40.694262 env[1189]: 2025-05-10 01:17:40.683 [WARNING][4406] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" HandleID="k8s-pod-network.22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0" May 10 01:17:40.694262 env[1189]: 2025-05-10 01:17:40.683 [INFO][4406] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" HandleID="k8s-pod-network.22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--znbw9-eth0" May 10 01:17:40.694262 env[1189]: 2025-05-10 01:17:40.691 [INFO][4406] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:40.694262 env[1189]: 2025-05-10 01:17:40.692 [INFO][4395] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356" May 10 01:17:40.694262 env[1189]: time="2025-05-10T01:17:40.694209408Z" level=info msg="TearDown network for sandbox \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\" successfully" May 10 01:17:40.706071 env[1189]: time="2025-05-10T01:17:40.706000858Z" level=info msg="RemovePodSandbox \"22bab7d99663114faffa54421caac3042997ea12a2303ce3c57c2bc02ab29356\" returns successfully" May 10 01:17:40.707026 env[1189]: time="2025-05-10T01:17:40.706970585Z" level=info msg="StopPodSandbox for \"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\"" May 10 01:17:40.860912 env[1189]: 2025-05-10 01:17:40.788 [WARNING][4426] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"58e5027b-f4ac-4e2f-b07f-7833816a6c67", ResourceVersion:"801", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6", Pod:"coredns-6f6b679f8f-vhkxk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7a9fcf14581", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:40.860912 env[1189]: 2025-05-10 01:17:40.789 [INFO][4426] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" May 10 01:17:40.860912 env[1189]: 2025-05-10 01:17:40.789 [INFO][4426] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" iface="eth0" netns="" May 10 01:17:40.860912 env[1189]: 2025-05-10 01:17:40.789 [INFO][4426] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" May 10 01:17:40.860912 env[1189]: 2025-05-10 01:17:40.789 [INFO][4426] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" May 10 01:17:40.860912 env[1189]: 2025-05-10 01:17:40.840 [INFO][4433] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" HandleID="k8s-pod-network.88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0" May 10 01:17:40.860912 env[1189]: 2025-05-10 01:17:40.841 [INFO][4433] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:40.860912 env[1189]: 2025-05-10 01:17:40.842 [INFO][4433] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:40.860912 env[1189]: 2025-05-10 01:17:40.853 [WARNING][4433] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" HandleID="k8s-pod-network.88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0" May 10 01:17:40.860912 env[1189]: 2025-05-10 01:17:40.853 [INFO][4433] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" HandleID="k8s-pod-network.88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0" May 10 01:17:40.860912 env[1189]: 2025-05-10 01:17:40.857 [INFO][4433] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:40.860912 env[1189]: 2025-05-10 01:17:40.859 [INFO][4426] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" May 10 01:17:40.863969 env[1189]: time="2025-05-10T01:17:40.860956655Z" level=info msg="TearDown network for sandbox \"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\" successfully" May 10 01:17:40.863969 env[1189]: time="2025-05-10T01:17:40.861012303Z" level=info msg="StopPodSandbox for \"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\" returns successfully" May 10 01:17:40.863969 env[1189]: time="2025-05-10T01:17:40.861947527Z" level=info msg="RemovePodSandbox for \"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\"" May 10 01:17:40.863969 env[1189]: time="2025-05-10T01:17:40.862003381Z" level=info msg="Forcibly stopping sandbox \"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\"" May 10 01:17:41.008764 env[1189]: 2025-05-10 01:17:40.931 [WARNING][4454] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"58e5027b-f4ac-4e2f-b07f-7833816a6c67", ResourceVersion:"801", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"60dfe3e1ebafd001c848ee32f3fc6c763dd23c1f46e7ea074e81facd8482abb6", Pod:"coredns-6f6b679f8f-vhkxk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7a9fcf14581", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:41.008764 env[1189]: 2025-05-10 01:17:40.932 [INFO][4454] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" May 10 01:17:41.008764 env[1189]: 2025-05-10 01:17:40.932 [INFO][4454] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" iface="eth0" netns="" May 10 01:17:41.008764 env[1189]: 2025-05-10 01:17:40.932 [INFO][4454] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" May 10 01:17:41.008764 env[1189]: 2025-05-10 01:17:40.932 [INFO][4454] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" May 10 01:17:41.008764 env[1189]: 2025-05-10 01:17:40.969 [INFO][4461] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" HandleID="k8s-pod-network.88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0" May 10 01:17:41.008764 env[1189]: 2025-05-10 01:17:40.970 [INFO][4461] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:41.008764 env[1189]: 2025-05-10 01:17:40.970 [INFO][4461] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:41.008764 env[1189]: 2025-05-10 01:17:40.993 [WARNING][4461] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" HandleID="k8s-pod-network.88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0" May 10 01:17:41.008764 env[1189]: 2025-05-10 01:17:40.993 [INFO][4461] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" HandleID="k8s-pod-network.88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--vhkxk-eth0" May 10 01:17:41.008764 env[1189]: 2025-05-10 01:17:40.998 [INFO][4461] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:41.008764 env[1189]: 2025-05-10 01:17:41.007 [INFO][4454] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb" May 10 01:17:41.010189 env[1189]: time="2025-05-10T01:17:41.010122035Z" level=info msg="TearDown network for sandbox \"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\" successfully" May 10 01:17:41.030462 env[1189]: time="2025-05-10T01:17:41.030392727Z" level=info msg="RemovePodSandbox \"88dfa81f2add57c83ada3b2a1dd9e0c62e01b8c4d4468ec7d1438717760cbfcb\" returns successfully" May 10 01:17:41.031502 env[1189]: time="2025-05-10T01:17:41.031461760Z" level=info msg="StopPodSandbox for \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\"" May 10 01:17:41.055770 kubelet[1991]: I0510 01:17:41.055504 1991 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-778fbb4795-znbw9" podStartSLOduration=41.782307326 podStartE2EDuration="49.05541914s" podCreationTimestamp="2025-05-10 01:16:52 +0000 UTC" firstStartedPulling="2025-05-10 01:17:32.41012154 +0000 UTC m=+53.149826602" lastFinishedPulling="2025-05-10 01:17:39.683233348 +0000 UTC m=+60.422938416" observedRunningTime="2025-05-10 01:17:41.047802815 +0000 UTC m=+61.787507883" watchObservedRunningTime="2025-05-10 01:17:41.05541914 +0000 UTC m=+61.795124214" May 10 01:17:41.103741 kubelet[1991]: I0510 01:17:41.103617 1991 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-778fbb4795-597wd" podStartSLOduration=41.537349101 podStartE2EDuration="49.10358915s" podCreationTimestamp="2025-05-10 01:16:52 +0000 UTC" firstStartedPulling="2025-05-10 01:17:32.516202746 +0000 UTC m=+53.255907813" lastFinishedPulling="2025-05-10 01:17:40.08244279 +0000 UTC m=+60.822147862" observedRunningTime="2025-05-10 01:17:41.090477975 +0000 UTC m=+61.830183045" watchObservedRunningTime="2025-05-10 01:17:41.10358915 +0000 UTC m=+61.843294225" May 10 01:17:41.185000 audit[4504]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4504 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:17:41.185000 audit[4504]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc45930570 a2=0 a3=7ffc4593055c items=0 ppid=2163 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:41.185000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:17:41.190000 audit[4504]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4504 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:17:41.190000 audit[4504]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc45930570 a2=0 a3=7ffc4593055c items=0 ppid=2163 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:41.190000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:17:41.218000 audit[4513]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4513 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:17:41.218000 audit[4513]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffde87e86e0 a2=0 a3=7ffde87e86cc items=0 ppid=2163 pid=4513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:41.218000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:17:41.228000 audit[4513]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4513 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:17:41.228000 audit[4513]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffde87e86e0 a2=0 a3=7ffde87e86cc items=0 ppid=2163 pid=4513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:41.228000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:17:41.284357 env[1189]: 2025-05-10 01:17:41.173 [WARNING][4492] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0", GenerateName:"calico-apiserver-778fbb4795-", Namespace:"calico-apiserver", SelfLink:"", UID:"d62fc1e5-8a86-41aa-9230-dba166d93b57", ResourceVersion:"893", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"778fbb4795", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022", Pod:"calico-apiserver-778fbb4795-597wd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0c6f5cc0db3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:41.284357 env[1189]: 2025-05-10 01:17:41.174 [INFO][4492] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" May 10 01:17:41.284357 env[1189]: 2025-05-10 01:17:41.174 [INFO][4492] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" iface="eth0" netns="" May 10 01:17:41.284357 env[1189]: 2025-05-10 01:17:41.174 [INFO][4492] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" May 10 01:17:41.284357 env[1189]: 2025-05-10 01:17:41.174 [INFO][4492] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" May 10 01:17:41.284357 env[1189]: 2025-05-10 01:17:41.247 [INFO][4507] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" HandleID="k8s-pod-network.8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0" May 10 01:17:41.284357 env[1189]: 2025-05-10 01:17:41.247 [INFO][4507] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:41.284357 env[1189]: 2025-05-10 01:17:41.247 [INFO][4507] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:41.284357 env[1189]: 2025-05-10 01:17:41.272 [WARNING][4507] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" HandleID="k8s-pod-network.8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0" May 10 01:17:41.284357 env[1189]: 2025-05-10 01:17:41.272 [INFO][4507] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" HandleID="k8s-pod-network.8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0" May 10 01:17:41.284357 env[1189]: 2025-05-10 01:17:41.280 [INFO][4507] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:41.284357 env[1189]: 2025-05-10 01:17:41.282 [INFO][4492] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" May 10 01:17:41.285469 env[1189]: time="2025-05-10T01:17:41.285413703Z" level=info msg="TearDown network for sandbox \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\" successfully" May 10 01:17:41.285627 env[1189]: time="2025-05-10T01:17:41.285590242Z" level=info msg="StopPodSandbox for \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\" returns successfully" May 10 01:17:41.286463 env[1189]: time="2025-05-10T01:17:41.286428656Z" level=info msg="RemovePodSandbox for \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\"" May 10 01:17:41.286877 env[1189]: time="2025-05-10T01:17:41.286813307Z" level=info msg="Forcibly stopping sandbox \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\"" May 10 01:17:41.495444 env[1189]: 2025-05-10 01:17:41.397 [WARNING][4529] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0", GenerateName:"calico-apiserver-778fbb4795-", Namespace:"calico-apiserver", SelfLink:"", UID:"d62fc1e5-8a86-41aa-9230-dba166d93b57", ResourceVersion:"893", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"778fbb4795", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"69f1e0782bd8398f85e396518d94a06d6a0416dc0572d67b362b85551da3a022", Pod:"calico-apiserver-778fbb4795-597wd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0c6f5cc0db3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:41.495444 env[1189]: 2025-05-10 01:17:41.397 [INFO][4529] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" May 10 01:17:41.495444 env[1189]: 2025-05-10 01:17:41.397 [INFO][4529] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" iface="eth0" netns="" May 10 01:17:41.495444 env[1189]: 2025-05-10 01:17:41.397 [INFO][4529] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" May 10 01:17:41.495444 env[1189]: 2025-05-10 01:17:41.397 [INFO][4529] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" May 10 01:17:41.495444 env[1189]: 2025-05-10 01:17:41.467 [INFO][4541] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" HandleID="k8s-pod-network.8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0" May 10 01:17:41.495444 env[1189]: 2025-05-10 01:17:41.467 [INFO][4541] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:41.495444 env[1189]: 2025-05-10 01:17:41.467 [INFO][4541] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:41.495444 env[1189]: 2025-05-10 01:17:41.487 [WARNING][4541] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" HandleID="k8s-pod-network.8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0" May 10 01:17:41.495444 env[1189]: 2025-05-10 01:17:41.487 [INFO][4541] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" HandleID="k8s-pod-network.8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" Workload="srv--2kvu9.gb1.brightbox.com-k8s-calico--apiserver--778fbb4795--597wd-eth0" May 10 01:17:41.495444 env[1189]: 2025-05-10 01:17:41.491 [INFO][4541] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:41.495444 env[1189]: 2025-05-10 01:17:41.493 [INFO][4529] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d" May 10 01:17:41.497085 env[1189]: time="2025-05-10T01:17:41.497020830Z" level=info msg="TearDown network for sandbox \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\" successfully" May 10 01:17:41.517272 env[1189]: time="2025-05-10T01:17:41.517168601Z" level=info msg="RemovePodSandbox \"8121a4d3cbf1a8602a58b5ef3ac1ca42dad7400317e0e4f0bae68d9c45d56c2d\" returns successfully" May 10 01:17:41.519141 env[1189]: time="2025-05-10T01:17:41.519101399Z" level=info msg="StopPodSandbox for \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\"" May 10 01:17:41.758358 env[1189]: 2025-05-10 01:17:41.606 [WARNING][4560] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"828cc85f-6fb9-4e67-adff-af880ac7ed1f", ResourceVersion:"860", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174", Pod:"csi-node-driver-xfs7c", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calicc61496249a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:41.758358 env[1189]: 2025-05-10 01:17:41.609 [INFO][4560] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" May 10 01:17:41.758358 env[1189]: 2025-05-10 01:17:41.610 [INFO][4560] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" iface="eth0" netns="" May 10 01:17:41.758358 env[1189]: 2025-05-10 01:17:41.610 [INFO][4560] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" May 10 01:17:41.758358 env[1189]: 2025-05-10 01:17:41.610 [INFO][4560] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" May 10 01:17:41.758358 env[1189]: 2025-05-10 01:17:41.698 [INFO][4567] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" HandleID="k8s-pod-network.6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" Workload="srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0" May 10 01:17:41.758358 env[1189]: 2025-05-10 01:17:41.698 [INFO][4567] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:41.758358 env[1189]: 2025-05-10 01:17:41.698 [INFO][4567] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:41.758358 env[1189]: 2025-05-10 01:17:41.744 [WARNING][4567] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" HandleID="k8s-pod-network.6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" Workload="srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0" May 10 01:17:41.758358 env[1189]: 2025-05-10 01:17:41.745 [INFO][4567] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" HandleID="k8s-pod-network.6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" Workload="srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0" May 10 01:17:41.758358 env[1189]: 2025-05-10 01:17:41.752 [INFO][4567] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:41.758358 env[1189]: 2025-05-10 01:17:41.754 [INFO][4560] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" May 10 01:17:41.811070 env[1189]: time="2025-05-10T01:17:41.759641144Z" level=info msg="TearDown network for sandbox \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\" successfully" May 10 01:17:41.811070 env[1189]: time="2025-05-10T01:17:41.759689780Z" level=info msg="StopPodSandbox for \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\" returns successfully" May 10 01:17:41.811070 env[1189]: time="2025-05-10T01:17:41.760424026Z" level=info msg="RemovePodSandbox for \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\"" May 10 01:17:41.811070 env[1189]: time="2025-05-10T01:17:41.760464342Z" level=info msg="Forcibly stopping sandbox \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\"" May 10 01:17:42.034688 kubelet[1991]: I0510 01:17:42.033955 1991 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 01:17:42.040195 env[1189]: 2025-05-10 01:17:41.921 [WARNING][4588] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"828cc85f-6fb9-4e67-adff-af880ac7ed1f", ResourceVersion:"860", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174", Pod:"csi-node-driver-xfs7c", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calicc61496249a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:42.040195 env[1189]: 2025-05-10 01:17:41.922 [INFO][4588] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" May 10 01:17:42.040195 env[1189]: 2025-05-10 01:17:41.922 [INFO][4588] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" iface="eth0" netns="" May 10 01:17:42.040195 env[1189]: 2025-05-10 01:17:41.922 [INFO][4588] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" May 10 01:17:42.040195 env[1189]: 2025-05-10 01:17:41.922 [INFO][4588] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" May 10 01:17:42.040195 env[1189]: 2025-05-10 01:17:41.998 [INFO][4595] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" HandleID="k8s-pod-network.6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" Workload="srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0" May 10 01:17:42.040195 env[1189]: 2025-05-10 01:17:42.002 [INFO][4595] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:42.040195 env[1189]: 2025-05-10 01:17:42.003 [INFO][4595] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:42.040195 env[1189]: 2025-05-10 01:17:42.029 [WARNING][4595] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" HandleID="k8s-pod-network.6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" Workload="srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0" May 10 01:17:42.040195 env[1189]: 2025-05-10 01:17:42.029 [INFO][4595] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" HandleID="k8s-pod-network.6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" Workload="srv--2kvu9.gb1.brightbox.com-k8s-csi--node--driver--xfs7c-eth0" May 10 01:17:42.040195 env[1189]: 2025-05-10 01:17:42.035 [INFO][4595] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:42.040195 env[1189]: 2025-05-10 01:17:42.037 [INFO][4588] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1" May 10 01:17:42.041508 env[1189]: time="2025-05-10T01:17:42.041454661Z" level=info msg="TearDown network for sandbox \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\" successfully" May 10 01:17:42.067871 env[1189]: time="2025-05-10T01:17:42.067772724Z" level=info msg="RemovePodSandbox \"6e2296777c04c460126622536c5918cdf96acb1644992d23f6a55ef7e71fa5c1\" returns successfully" May 10 01:17:42.069000 env[1189]: time="2025-05-10T01:17:42.068960037Z" level=info msg="StopPodSandbox for \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\"" May 10 01:17:42.332560 env[1189]: 2025-05-10 01:17:42.193 [WARNING][4613] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"a8202034-330d-4ba1-b2a5-d033aec45ae4", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167", Pod:"coredns-6f6b679f8f-gzcsf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2103c655fb4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:42.332560 env[1189]: 2025-05-10 01:17:42.193 [INFO][4613] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" May 10 01:17:42.332560 env[1189]: 2025-05-10 01:17:42.193 [INFO][4613] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" iface="eth0" netns="" May 10 01:17:42.332560 env[1189]: 2025-05-10 01:17:42.193 [INFO][4613] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" May 10 01:17:42.332560 env[1189]: 2025-05-10 01:17:42.193 [INFO][4613] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" May 10 01:17:42.332560 env[1189]: 2025-05-10 01:17:42.304 [INFO][4620] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" HandleID="k8s-pod-network.4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0" May 10 01:17:42.332560 env[1189]: 2025-05-10 01:17:42.305 [INFO][4620] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:42.332560 env[1189]: 2025-05-10 01:17:42.305 [INFO][4620] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:42.332560 env[1189]: 2025-05-10 01:17:42.324 [WARNING][4620] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" HandleID="k8s-pod-network.4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0" May 10 01:17:42.332560 env[1189]: 2025-05-10 01:17:42.324 [INFO][4620] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" HandleID="k8s-pod-network.4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0" May 10 01:17:42.332560 env[1189]: 2025-05-10 01:17:42.327 [INFO][4620] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:42.332560 env[1189]: 2025-05-10 01:17:42.330 [INFO][4613] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" May 10 01:17:42.335010 env[1189]: time="2025-05-10T01:17:42.332518893Z" level=info msg="TearDown network for sandbox \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\" successfully" May 10 01:17:42.335010 env[1189]: time="2025-05-10T01:17:42.333761365Z" level=info msg="StopPodSandbox for \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\" returns successfully" May 10 01:17:42.335010 env[1189]: time="2025-05-10T01:17:42.334869561Z" level=info msg="RemovePodSandbox for \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\"" May 10 01:17:42.335010 env[1189]: time="2025-05-10T01:17:42.334926876Z" level=info msg="Forcibly stopping sandbox \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\"" May 10 01:17:42.533263 env[1189]: time="2025-05-10T01:17:42.533199962Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:42.547357 env[1189]: time="2025-05-10T01:17:42.547292460Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:42.551475 env[1189]: time="2025-05-10T01:17:42.551417369Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:42.555203 env[1189]: time="2025-05-10T01:17:42.555155640Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:42.560264 env[1189]: time="2025-05-10T01:17:42.560202845Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 10 01:17:42.576350 env[1189]: time="2025-05-10T01:17:42.576286300Z" level=info msg="CreateContainer within sandbox \"f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 10 01:17:42.624403 env[1189]: time="2025-05-10T01:17:42.624271029Z" level=info msg="CreateContainer within sandbox \"f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"fee6a1f38c7fae2fe3deada7fd7342ad885cadd36e1fce729b37376865baf1ef\"" May 10 01:17:42.625858 env[1189]: time="2025-05-10T01:17:42.625823115Z" level=info msg="StartContainer for \"fee6a1f38c7fae2fe3deada7fd7342ad885cadd36e1fce729b37376865baf1ef\"" May 10 01:17:42.631059 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount421036025.mount: Deactivated successfully. May 10 01:17:42.688468 systemd[1]: run-containerd-runc-k8s.io-fee6a1f38c7fae2fe3deada7fd7342ad885cadd36e1fce729b37376865baf1ef-runc.6Lo8Av.mount: Deactivated successfully. May 10 01:17:42.698492 systemd[1]: Started cri-containerd-fee6a1f38c7fae2fe3deada7fd7342ad885cadd36e1fce729b37376865baf1ef.scope. May 10 01:17:42.784000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.791556 kernel: kauditd_printk_skb: 320 callbacks suppressed May 10 01:17:42.792416 kernel: audit: type=1400 audit(1746839862.784:1363): avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.799460 kernel: audit: type=1300 audit(1746839862.784:1363): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fcd2d697be8 items=0 ppid=4089 pid=4658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:42.799570 kernel: audit: type=1327 audit(1746839862.784:1363): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653661316633386337666165326665336465616461376664373334 May 10 01:17:42.784000 audit[4658]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fcd2d697be8 items=0 ppid=4089 pid=4658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:42.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653661316633386337666165326665336465616461376664373334 May 10 01:17:42.806547 kernel: audit: type=1400 audit(1746839862.784:1364): avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.784000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.784000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.818802 kernel: audit: type=1400 audit(1746839862.784:1364): avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.784000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.825788 kernel: audit: type=1400 audit(1746839862.784:1364): avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.825917 kernel: audit: type=1400 audit(1746839862.784:1364): avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.784000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.784000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.847796 kernel: audit: type=1400 audit(1746839862.784:1364): avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.784000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.854733 kernel: audit: type=1400 audit(1746839862.784:1364): avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.784000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.865771 kernel: audit: type=1400 audit(1746839862.784:1364): avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.784000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.784000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.784000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.784000 audit: BPF prog-id=208 op=LOAD May 10 01:17:42.784000 audit[4658]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000349b88 items=0 ppid=4089 pid=4658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:42.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653661316633386337666165326665336465616461376664373334 May 10 01:17:42.799000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.799000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.799000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.799000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.799000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.799000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.799000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.799000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.799000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.799000 audit: BPF prog-id=209 op=LOAD May 10 01:17:42.799000 audit[4658]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000349bd8 items=0 ppid=4089 pid=4658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:42.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653661316633386337666165326665336465616461376664373334 May 10 01:17:42.811000 audit: BPF prog-id=209 op=UNLOAD May 10 01:17:42.811000 audit: BPF prog-id=208 op=UNLOAD May 10 01:17:42.811000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.811000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.811000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.811000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.811000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.811000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.811000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.811000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.811000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.811000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:42.811000 audit: BPF prog-id=210 op=LOAD May 10 01:17:42.811000 audit[4658]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000349c68 items=0 ppid=4089 pid=4658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:42.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653661316633386337666165326665336465616461376664373334 May 10 01:17:42.878886 env[1189]: time="2025-05-10T01:17:42.878775649Z" level=info msg="StartContainer for \"fee6a1f38c7fae2fe3deada7fd7342ad885cadd36e1fce729b37376865baf1ef\" returns successfully" May 10 01:17:42.884535 env[1189]: time="2025-05-10T01:17:42.884489608Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 10 01:17:42.981153 env[1189]: 2025-05-10 01:17:42.629 [WARNING][4640] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"a8202034-330d-4ba1-b2a5-d033aec45ae4", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 16, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-2kvu9.gb1.brightbox.com", ContainerID:"3e05fe88e4ea99e715d1e08c7cb394b57f88a52651a9ce60a9cb4224b66a1167", Pod:"coredns-6f6b679f8f-gzcsf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2103c655fb4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:17:42.981153 env[1189]: 2025-05-10 01:17:42.630 [INFO][4640] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" May 10 01:17:42.981153 env[1189]: 2025-05-10 01:17:42.631 [INFO][4640] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" iface="eth0" netns="" May 10 01:17:42.981153 env[1189]: 2025-05-10 01:17:42.631 [INFO][4640] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" May 10 01:17:42.981153 env[1189]: 2025-05-10 01:17:42.631 [INFO][4640] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" May 10 01:17:42.981153 env[1189]: 2025-05-10 01:17:42.737 [INFO][4648] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" HandleID="k8s-pod-network.4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0" May 10 01:17:42.981153 env[1189]: 2025-05-10 01:17:42.737 [INFO][4648] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:17:42.981153 env[1189]: 2025-05-10 01:17:42.737 [INFO][4648] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:17:42.981153 env[1189]: 2025-05-10 01:17:42.755 [WARNING][4648] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" HandleID="k8s-pod-network.4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0" May 10 01:17:42.981153 env[1189]: 2025-05-10 01:17:42.755 [INFO][4648] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" HandleID="k8s-pod-network.4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" Workload="srv--2kvu9.gb1.brightbox.com-k8s-coredns--6f6b679f8f--gzcsf-eth0" May 10 01:17:42.981153 env[1189]: 2025-05-10 01:17:42.973 [INFO][4648] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:17:42.981153 env[1189]: 2025-05-10 01:17:42.978 [INFO][4640] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe" May 10 01:17:42.982378 env[1189]: time="2025-05-10T01:17:42.982323360Z" level=info msg="TearDown network for sandbox \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\" successfully" May 10 01:17:42.987001 env[1189]: time="2025-05-10T01:17:42.986904302Z" level=info msg="RemovePodSandbox \"4fe07439cfee4ef8a6d47aa3cfa81eabeb72bade91ed11e9fbb0a58a4a9973fe\" returns successfully" May 10 01:17:43.029438 kubelet[1991]: I0510 01:17:43.029380 1991 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 01:17:43.072000 audit[4270]: AVC avc: denied { watch } for pid=4270 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_01_17_07.3474691932/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c634,c939 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c634,c939 tclass=file permissive=0 May 10 01:17:43.072000 audit[4270]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000473e60 a2=fc6 a3=0 items=0 ppid=3817 pid=4270 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c634,c939 key=(null) May 10 01:17:43.072000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 01:17:43.193000 audit[4689]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4689 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:17:43.193000 audit[4689]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe35d818e0 a2=0 a3=7ffe35d818cc items=0 ppid=2163 pid=4689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:43.193000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:17:43.200000 audit[4689]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=4689 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:17:43.200000 audit[4689]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe35d818e0 a2=0 a3=7ffe35d818cc items=0 ppid=2163 pid=4689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:43.200000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:17:43.753000 audit[4331]: AVC avc: denied { watch } for pid=4331 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_01_17_07.2525071533/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c166,c399 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c166,c399 tclass=file permissive=0 May 10 01:17:43.753000 audit[4331]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000058de0 a2=fc6 a3=0 items=0 ppid=3870 pid=4331 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c166,c399 key=(null) May 10 01:17:43.753000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 01:17:45.277594 env[1189]: time="2025-05-10T01:17:45.277426851Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:45.281055 env[1189]: time="2025-05-10T01:17:45.281011906Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:45.282957 env[1189]: time="2025-05-10T01:17:45.282905084Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:45.285874 env[1189]: time="2025-05-10T01:17:45.285830401Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:17:45.286617 env[1189]: time="2025-05-10T01:17:45.286565925Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 10 01:17:45.295058 env[1189]: time="2025-05-10T01:17:45.294998479Z" level=info msg="CreateContainer within sandbox \"f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 10 01:17:45.325509 env[1189]: time="2025-05-10T01:17:45.325440690Z" level=info msg="CreateContainer within sandbox \"f24e5c8ec4da9ceca319dc4f3e86fece1a52853074669dcdbd1706aa9cdd9174\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"65ceee5e484aeee709dfdf5560c6a8ee16596db1921cf47b9d83adfd6f57bff0\"" May 10 01:17:45.327188 env[1189]: time="2025-05-10T01:17:45.327133824Z" level=info msg="StartContainer for \"65ceee5e484aeee709dfdf5560c6a8ee16596db1921cf47b9d83adfd6f57bff0\"" May 10 01:17:45.401648 systemd[1]: Started cri-containerd-65ceee5e484aeee709dfdf5560c6a8ee16596db1921cf47b9d83adfd6f57bff0.scope. May 10 01:17:45.419190 systemd[1]: run-containerd-runc-k8s.io-65ceee5e484aeee709dfdf5560c6a8ee16596db1921cf47b9d83adfd6f57bff0-runc.lQKGkS.mount: Deactivated successfully. May 10 01:17:45.484000 audit[4698]: AVC avc: denied { perfmon } for pid=4698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.484000 audit[4698]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f081ca98d48 items=0 ppid=4089 pid=4698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:45.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635636565653565343834616565653730396466646635353630633661 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { bpf } for pid=4698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { bpf } for pid=4698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { bpf } for pid=4698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { perfmon } for pid=4698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { perfmon } for pid=4698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { perfmon } for pid=4698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { perfmon } for pid=4698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { perfmon } for pid=4698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { bpf } for pid=4698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { bpf } for pid=4698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit: BPF prog-id=211 op=LOAD May 10 01:17:45.486000 audit[4698]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001b50f8 items=0 ppid=4089 pid=4698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:45.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635636565653565343834616565653730396466646635353630633661 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { bpf } for pid=4698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { bpf } for pid=4698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { perfmon } for pid=4698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { perfmon } for pid=4698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { perfmon } for pid=4698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { perfmon } for pid=4698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { perfmon } for pid=4698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { bpf } for pid=4698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { bpf } for pid=4698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit: BPF prog-id=212 op=LOAD May 10 01:17:45.486000 audit[4698]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0001b5148 items=0 ppid=4089 pid=4698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:45.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635636565653565343834616565653730396466646635353630633661 May 10 01:17:45.486000 audit: BPF prog-id=212 op=UNLOAD May 10 01:17:45.486000 audit: BPF prog-id=211 op=UNLOAD May 10 01:17:45.486000 audit[4698]: AVC avc: denied { bpf } for pid=4698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { bpf } for pid=4698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { bpf } for pid=4698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { perfmon } for pid=4698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { perfmon } for pid=4698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { perfmon } for pid=4698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { perfmon } for pid=4698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { perfmon } for pid=4698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { bpf } for pid=4698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit[4698]: AVC avc: denied { bpf } for pid=4698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:17:45.486000 audit: BPF prog-id=213 op=LOAD May 10 01:17:45.486000 audit[4698]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0001b51d8 items=0 ppid=4089 pid=4698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:45.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635636565653565343834616565653730396466646635353630633661 May 10 01:17:45.530875 env[1189]: time="2025-05-10T01:17:45.530740105Z" level=info msg="StartContainer for \"65ceee5e484aeee709dfdf5560c6a8ee16596db1921cf47b9d83adfd6f57bff0\" returns successfully" May 10 01:17:45.892030 kubelet[1991]: I0510 01:17:45.889426 1991 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 10 01:17:45.895066 kubelet[1991]: I0510 01:17:45.895014 1991 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 10 01:17:46.073203 kubelet[1991]: I0510 01:17:46.071793 1991 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-xfs7c" podStartSLOduration=45.479399727 podStartE2EDuration="54.065775721s" podCreationTimestamp="2025-05-10 01:16:52 +0000 UTC" firstStartedPulling="2025-05-10 01:17:36.701962421 +0000 UTC m=+57.441667483" lastFinishedPulling="2025-05-10 01:17:45.288338415 +0000 UTC m=+66.028043477" observedRunningTime="2025-05-10 01:17:46.064252368 +0000 UTC m=+66.803957455" watchObservedRunningTime="2025-05-10 01:17:46.065775721 +0000 UTC m=+66.805480792" May 10 01:17:51.746843 systemd[1]: Started sshd@9-10.244.17.126:22-139.178.68.195:41680.service. May 10 01:17:51.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.17.126:22-139.178.68.195:41680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:17:51.753629 kernel: kauditd_printk_skb: 88 callbacks suppressed May 10 01:17:51.754185 kernel: audit: type=1130 audit(1746839871.750:1379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.17.126:22-139.178.68.195:41680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:17:52.739728 sshd[4741]: Accepted publickey for core from 139.178.68.195 port 41680 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:17:52.738000 audit[4741]: USER_ACCT pid=4741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:17:52.748740 kernel: audit: type=1101 audit(1746839872.738:1380): pid=4741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:17:52.749522 kernel: audit: type=1103 audit(1746839872.746:1381): pid=4741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:17:52.746000 audit[4741]: CRED_ACQ pid=4741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:17:52.752152 sshd[4741]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:17:52.759931 kernel: audit: type=1006 audit(1746839872.746:1382): pid=4741 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 10 01:17:52.760391 kernel: audit: type=1300 audit(1746839872.746:1382): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd32ab2590 a2=3 a3=0 items=0 ppid=1 pid=4741 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:52.746000 audit[4741]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd32ab2590 a2=3 a3=0 items=0 ppid=1 pid=4741 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:17:52.746000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:17:52.770214 kernel: audit: type=1327 audit(1746839872.746:1382): proctitle=737368643A20636F7265205B707269765D May 10 01:17:52.783803 systemd-logind[1185]: New session 10 of user core. May 10 01:17:52.786683 systemd[1]: Started session-10.scope. May 10 01:17:52.796000 audit[4741]: USER_START pid=4741 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:17:52.808267 kernel: audit: type=1105 audit(1746839872.796:1383): pid=4741 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:17:52.808422 kernel: audit: type=1103 audit(1746839872.805:1384): pid=4743 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:17:52.805000 audit[4743]: CRED_ACQ pid=4743 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:17:54.055193 sshd[4741]: pam_unix(sshd:session): session closed for user core May 10 01:17:54.055000 audit[4741]: USER_END pid=4741 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:17:54.068478 kernel: audit: type=1106 audit(1746839874.055:1385): pid=4741 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:17:54.067591 systemd-logind[1185]: Session 10 logged out. Waiting for processes to exit. May 10 01:17:54.068169 systemd[1]: sshd@9-10.244.17.126:22-139.178.68.195:41680.service: Deactivated successfully. May 10 01:17:54.070325 systemd[1]: session-10.scope: Deactivated successfully. May 10 01:17:54.056000 audit[4741]: CRED_DISP pid=4741 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:17:54.077750 kernel: audit: type=1104 audit(1746839874.056:1386): pid=4741 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:17:54.078124 systemd-logind[1185]: Removed session 10. May 10 01:17:54.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.17.126:22-139.178.68.195:41680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:17:59.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.17.126:22-139.178.68.195:45166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:17:59.215119 systemd[1]: Started sshd@10-10.244.17.126:22-139.178.68.195:45166.service. May 10 01:17:59.218512 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 01:17:59.218818 kernel: audit: type=1130 audit(1746839879.214:1388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.17.126:22-139.178.68.195:45166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:00.130000 audit[4757]: USER_ACCT pid=4757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:00.132737 sshd[4757]: Accepted publickey for core from 139.178.68.195 port 45166 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:18:00.137734 kernel: audit: type=1101 audit(1746839880.130:1389): pid=4757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:00.137000 audit[4757]: CRED_ACQ pid=4757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:00.139197 sshd[4757]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:18:00.150817 kernel: audit: type=1103 audit(1746839880.137:1390): pid=4757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:00.152315 kernel: audit: type=1006 audit(1746839880.137:1391): pid=4757 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 10 01:18:00.137000 audit[4757]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff22c843d0 a2=3 a3=0 items=0 ppid=1 pid=4757 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:00.163836 kernel: audit: type=1300 audit(1746839880.137:1391): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff22c843d0 a2=3 a3=0 items=0 ppid=1 pid=4757 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:00.164129 kernel: audit: type=1327 audit(1746839880.137:1391): proctitle=737368643A20636F7265205B707269765D May 10 01:18:00.137000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:18:00.184190 systemd-logind[1185]: New session 11 of user core. May 10 01:18:00.185408 systemd[1]: Started session-11.scope. May 10 01:18:00.205755 kernel: audit: type=1105 audit(1746839880.195:1392): pid=4757 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:00.195000 audit[4757]: USER_START pid=4757 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:00.195000 audit[4759]: CRED_ACQ pid=4759 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:00.215747 kernel: audit: type=1103 audit(1746839880.195:1393): pid=4759 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:01.006756 sshd[4757]: pam_unix(sshd:session): session closed for user core May 10 01:18:01.008000 audit[4757]: USER_END pid=4757 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:01.011445 systemd[1]: sshd@10-10.244.17.126:22-139.178.68.195:45166.service: Deactivated successfully. May 10 01:18:01.013351 systemd[1]: session-11.scope: Deactivated successfully. May 10 01:18:01.008000 audit[4757]: CRED_DISP pid=4757 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:01.023788 kernel: audit: type=1106 audit(1746839881.008:1394): pid=4757 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:01.024778 kernel: audit: type=1104 audit(1746839881.008:1395): pid=4757 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:01.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.17.126:22-139.178.68.195:45166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:01.024003 systemd-logind[1185]: Session 11 logged out. Waiting for processes to exit. May 10 01:18:01.025938 systemd-logind[1185]: Removed session 11. May 10 01:18:03.257696 kubelet[1991]: I0510 01:18:03.257605 1991 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 01:18:03.390000 audit[4795]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4795 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:18:03.390000 audit[4795]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffef7961f50 a2=0 a3=7ffef7961f3c items=0 ppid=2163 pid=4795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:03.390000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:18:03.400000 audit[4795]: NETFILTER_CFG table=nat:120 family=2 entries=34 op=nft_register_chain pid=4795 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:18:03.400000 audit[4795]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffef7961f50 a2=0 a3=7ffef7961f3c items=0 ppid=2163 pid=4795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:03.400000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:18:06.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.17.126:22-139.178.68.195:54122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:06.155977 systemd[1]: Started sshd@11-10.244.17.126:22-139.178.68.195:54122.service. May 10 01:18:06.172836 kernel: kauditd_printk_skb: 7 callbacks suppressed May 10 01:18:06.173107 kernel: audit: type=1130 audit(1746839886.155:1399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.17.126:22-139.178.68.195:54122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:07.061000 audit[4797]: USER_ACCT pid=4797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:07.064626 sshd[4797]: Accepted publickey for core from 139.178.68.195 port 54122 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:18:07.069737 kernel: audit: type=1101 audit(1746839887.061:1400): pid=4797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:07.069000 audit[4797]: CRED_ACQ pid=4797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:07.071659 sshd[4797]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:18:07.081406 kernel: audit: type=1103 audit(1746839887.069:1401): pid=4797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:07.081561 kernel: audit: type=1006 audit(1746839887.069:1402): pid=4797 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 10 01:18:07.069000 audit[4797]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd34cb0bf0 a2=3 a3=0 items=0 ppid=1 pid=4797 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:07.089735 kernel: audit: type=1300 audit(1746839887.069:1402): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd34cb0bf0 a2=3 a3=0 items=0 ppid=1 pid=4797 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:07.069000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:18:07.093752 kernel: audit: type=1327 audit(1746839887.069:1402): proctitle=737368643A20636F7265205B707269765D May 10 01:18:07.098480 systemd-logind[1185]: New session 12 of user core. May 10 01:18:07.100437 systemd[1]: Started session-12.scope. May 10 01:18:07.109000 audit[4797]: USER_START pid=4797 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:07.118875 kernel: audit: type=1105 audit(1746839887.109:1403): pid=4797 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:07.117000 audit[4805]: CRED_ACQ pid=4805 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:07.126803 kernel: audit: type=1103 audit(1746839887.117:1404): pid=4805 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:07.851425 sshd[4797]: pam_unix(sshd:session): session closed for user core May 10 01:18:07.860000 audit[4797]: USER_END pid=4797 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:07.868776 kernel: audit: type=1106 audit(1746839887.860:1405): pid=4797 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:07.869627 systemd[1]: sshd@11-10.244.17.126:22-139.178.68.195:54122.service: Deactivated successfully. May 10 01:18:07.871646 systemd[1]: session-12.scope: Deactivated successfully. May 10 01:18:07.860000 audit[4797]: CRED_DISP pid=4797 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:07.872676 systemd-logind[1185]: Session 12 logged out. Waiting for processes to exit. May 10 01:18:07.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.17.126:22-139.178.68.195:54122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:07.879891 kernel: audit: type=1104 audit(1746839887.860:1406): pid=4797 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:07.881007 systemd-logind[1185]: Removed session 12. May 10 01:18:09.524979 systemd[1]: run-containerd-runc-k8s.io-5faa7124e48367631dcb969aff3b949d761b93f895b516d8557bbc72abd8642f-runc.jWllP5.mount: Deactivated successfully. May 10 01:18:13.005834 systemd[1]: Started sshd@12-10.244.17.126:22-139.178.68.195:54132.service. May 10 01:18:13.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.17.126:22-139.178.68.195:54132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:13.008979 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 01:18:13.009116 kernel: audit: type=1130 audit(1746839893.006:1408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.17.126:22-139.178.68.195:54132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:13.927540 sshd[4854]: Accepted publickey for core from 139.178.68.195 port 54132 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:18:13.924000 audit[4854]: USER_ACCT pid=4854 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:13.932100 sshd[4854]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:18:13.935910 kernel: audit: type=1101 audit(1746839893.924:1409): pid=4854 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:13.930000 audit[4854]: CRED_ACQ pid=4854 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:13.943745 kernel: audit: type=1103 audit(1746839893.930:1410): pid=4854 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:13.949759 kernel: audit: type=1006 audit(1746839893.930:1411): pid=4854 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 10 01:18:13.930000 audit[4854]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5bdae360 a2=3 a3=0 items=0 ppid=1 pid=4854 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:13.959313 kernel: audit: type=1300 audit(1746839893.930:1411): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5bdae360 a2=3 a3=0 items=0 ppid=1 pid=4854 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:13.964085 systemd[1]: Started session-13.scope. May 10 01:18:13.964982 systemd-logind[1185]: New session 13 of user core. May 10 01:18:13.970034 kernel: audit: type=1327 audit(1746839893.930:1411): proctitle=737368643A20636F7265205B707269765D May 10 01:18:13.930000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:18:13.978000 audit[4854]: USER_START pid=4854 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:13.988614 kernel: audit: type=1105 audit(1746839893.978:1412): pid=4854 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:13.988773 kernel: audit: type=1103 audit(1746839893.987:1413): pid=4856 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:13.987000 audit[4856]: CRED_ACQ pid=4856 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:14.893806 systemd[1]: Started sshd@13-10.244.17.126:22-139.178.68.195:54136.service. May 10 01:18:14.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.17.126:22-139.178.68.195:54136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:14.902805 kernel: audit: type=1130 audit(1746839894.893:1414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.17.126:22-139.178.68.195:54136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:15.242604 sshd[4854]: pam_unix(sshd:session): session closed for user core May 10 01:18:15.244000 audit[4854]: USER_END pid=4854 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:15.253890 kernel: audit: type=1106 audit(1746839895.244:1415): pid=4854 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:15.252000 audit[4854]: CRED_DISP pid=4854 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:15.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.17.126:22-139.178.68.195:54132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:15.255464 systemd[1]: sshd@12-10.244.17.126:22-139.178.68.195:54132.service: Deactivated successfully. May 10 01:18:15.258300 systemd[1]: session-13.scope: Deactivated successfully. May 10 01:18:15.261656 systemd-logind[1185]: Session 13 logged out. Waiting for processes to exit. May 10 01:18:15.263226 systemd-logind[1185]: Removed session 13. May 10 01:18:15.821000 audit[4866]: USER_ACCT pid=4866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:15.822365 sshd[4866]: Accepted publickey for core from 139.178.68.195 port 54136 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:18:15.822000 audit[4866]: CRED_ACQ pid=4866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:15.822000 audit[4866]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe7934ce0 a2=3 a3=0 items=0 ppid=1 pid=4866 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:15.822000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:18:15.825072 sshd[4866]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:18:15.832611 systemd-logind[1185]: New session 14 of user core. May 10 01:18:15.833821 systemd[1]: Started session-14.scope. May 10 01:18:15.842000 audit[4866]: USER_START pid=4866 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:15.845000 audit[4869]: CRED_ACQ pid=4869 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:16.719112 sshd[4866]: pam_unix(sshd:session): session closed for user core May 10 01:18:16.723000 audit[4866]: USER_END pid=4866 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:16.723000 audit[4866]: CRED_DISP pid=4866 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:16.726657 systemd[1]: sshd@13-10.244.17.126:22-139.178.68.195:54136.service: Deactivated successfully. May 10 01:18:16.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.17.126:22-139.178.68.195:54136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:16.728019 systemd[1]: session-14.scope: Deactivated successfully. May 10 01:18:16.728815 systemd-logind[1185]: Session 14 logged out. Waiting for processes to exit. May 10 01:18:16.730619 systemd-logind[1185]: Removed session 14. May 10 01:18:16.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.17.126:22-139.178.68.195:45826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:16.869364 systemd[1]: Started sshd@14-10.244.17.126:22-139.178.68.195:45826.service. May 10 01:18:17.787000 audit[4881]: USER_ACCT pid=4881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:17.789849 sshd[4881]: Accepted publickey for core from 139.178.68.195 port 45826 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:18:17.789000 audit[4881]: CRED_ACQ pid=4881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:17.790000 audit[4881]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef32e6600 a2=3 a3=0 items=0 ppid=1 pid=4881 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:17.790000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:18:17.792141 sshd[4881]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:18:17.799909 systemd-logind[1185]: New session 15 of user core. May 10 01:18:17.801388 systemd[1]: Started session-15.scope. May 10 01:18:17.811000 audit[4881]: USER_START pid=4881 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:17.814000 audit[4883]: CRED_ACQ pid=4883 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:18.559202 sshd[4881]: pam_unix(sshd:session): session closed for user core May 10 01:18:18.575030 kernel: kauditd_printk_skb: 20 callbacks suppressed May 10 01:18:18.579853 kernel: audit: type=1106 audit(1746839898.560:1432): pid=4881 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:18.579972 kernel: audit: type=1104 audit(1746839898.566:1433): pid=4881 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:18.560000 audit[4881]: USER_END pid=4881 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:18.566000 audit[4881]: CRED_DISP pid=4881 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:18.577469 systemd[1]: sshd@14-10.244.17.126:22-139.178.68.195:45826.service: Deactivated successfully. May 10 01:18:18.579203 systemd[1]: session-15.scope: Deactivated successfully. May 10 01:18:18.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.17.126:22-139.178.68.195:45826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:18.591970 kernel: audit: type=1131 audit(1746839898.577:1434): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.17.126:22-139.178.68.195:45826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:18.592739 systemd-logind[1185]: Session 15 logged out. Waiting for processes to exit. May 10 01:18:18.599677 systemd-logind[1185]: Removed session 15. May 10 01:18:23.708321 systemd[1]: Started sshd@15-10.244.17.126:22-139.178.68.195:45836.service. May 10 01:18:23.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.17.126:22-139.178.68.195:45836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:23.716053 kernel: audit: type=1130 audit(1746839903.708:1435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.17.126:22-139.178.68.195:45836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:24.615000 audit[4899]: USER_ACCT pid=4899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:24.626533 sshd[4899]: Accepted publickey for core from 139.178.68.195 port 45836 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:18:24.627199 kernel: audit: type=1101 audit(1746839904.615:1436): pid=4899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:24.627294 sshd[4899]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:18:24.625000 audit[4899]: CRED_ACQ pid=4899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:24.634752 kernel: audit: type=1103 audit(1746839904.625:1437): pid=4899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:24.625000 audit[4899]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc00a4a260 a2=3 a3=0 items=0 ppid=1 pid=4899 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:24.648313 kernel: audit: type=1006 audit(1746839904.625:1438): pid=4899 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 10 01:18:24.648465 kernel: audit: type=1300 audit(1746839904.625:1438): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc00a4a260 a2=3 a3=0 items=0 ppid=1 pid=4899 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:24.652678 kernel: audit: type=1327 audit(1746839904.625:1438): proctitle=737368643A20636F7265205B707269765D May 10 01:18:24.625000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:18:24.652069 systemd-logind[1185]: New session 16 of user core. May 10 01:18:24.653398 systemd[1]: Started session-16.scope. May 10 01:18:24.663000 audit[4899]: USER_START pid=4899 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:24.673512 kernel: audit: type=1105 audit(1746839904.663:1439): pid=4899 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:24.673661 kernel: audit: type=1103 audit(1746839904.672:1440): pid=4901 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:24.672000 audit[4901]: CRED_ACQ pid=4901 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:25.438768 sshd[4899]: pam_unix(sshd:session): session closed for user core May 10 01:18:25.441000 audit[4899]: USER_END pid=4899 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:25.451000 audit[4899]: CRED_DISP pid=4899 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:25.458900 kernel: audit: type=1106 audit(1746839905.441:1441): pid=4899 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:25.459085 kernel: audit: type=1104 audit(1746839905.451:1442): pid=4899 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:25.460157 systemd[1]: sshd@15-10.244.17.126:22-139.178.68.195:45836.service: Deactivated successfully. May 10 01:18:25.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.17.126:22-139.178.68.195:45836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:25.461835 systemd[1]: session-16.scope: Deactivated successfully. May 10 01:18:25.463400 systemd-logind[1185]: Session 16 logged out. Waiting for processes to exit. May 10 01:18:25.465069 systemd-logind[1185]: Removed session 16. May 10 01:18:30.588235 systemd[1]: Started sshd@16-10.244.17.126:22-139.178.68.195:42790.service. May 10 01:18:30.593889 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 01:18:30.594320 kernel: audit: type=1130 audit(1746839910.588:1444): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.17.126:22-139.178.68.195:42790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:30.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.17.126:22-139.178.68.195:42790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:31.504000 audit[4911]: USER_ACCT pid=4911 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:31.505860 sshd[4911]: Accepted publickey for core from 139.178.68.195 port 42790 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:18:31.512778 kernel: audit: type=1101 audit(1746839911.504:1445): pid=4911 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:31.513000 audit[4911]: CRED_ACQ pid=4911 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:31.515795 sshd[4911]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:18:31.521762 kernel: audit: type=1103 audit(1746839911.513:1446): pid=4911 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:31.526792 kernel: audit: type=1006 audit(1746839911.513:1447): pid=4911 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 10 01:18:31.526957 kernel: audit: type=1300 audit(1746839911.513:1447): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc61ed1270 a2=3 a3=0 items=0 ppid=1 pid=4911 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:31.513000 audit[4911]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc61ed1270 a2=3 a3=0 items=0 ppid=1 pid=4911 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:31.513000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:18:31.537820 kernel: audit: type=1327 audit(1746839911.513:1447): proctitle=737368643A20636F7265205B707269765D May 10 01:18:31.542617 systemd-logind[1185]: New session 17 of user core. May 10 01:18:31.543809 systemd[1]: Started session-17.scope. May 10 01:18:31.553000 audit[4911]: USER_START pid=4911 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:31.556000 audit[4913]: CRED_ACQ pid=4913 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:31.582744 kernel: audit: type=1105 audit(1746839911.553:1448): pid=4911 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:31.582925 kernel: audit: type=1103 audit(1746839911.556:1449): pid=4913 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:32.299081 sshd[4911]: pam_unix(sshd:session): session closed for user core May 10 01:18:32.301000 audit[4911]: USER_END pid=4911 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:32.309754 kernel: audit: type=1106 audit(1746839912.301:1450): pid=4911 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:32.309000 audit[4911]: CRED_DISP pid=4911 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:32.320100 kernel: audit: type=1104 audit(1746839912.309:1451): pid=4911 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:32.320048 systemd[1]: sshd@16-10.244.17.126:22-139.178.68.195:42790.service: Deactivated successfully. May 10 01:18:32.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.17.126:22-139.178.68.195:42790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:32.321543 systemd[1]: session-17.scope: Deactivated successfully. May 10 01:18:32.322534 systemd-logind[1185]: Session 17 logged out. Waiting for processes to exit. May 10 01:18:32.323799 systemd-logind[1185]: Removed session 17. May 10 01:18:33.682000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:18:33.682000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0031417e0 a2=fc6 a3=0 items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 key=(null) May 10 01:18:33.682000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:18:33.682000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:18:33.682000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028bf3e0 a2=fc6 a3=0 items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 key=(null) May 10 01:18:33.682000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:18:34.728000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:18:34.728000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c007951a40 a2=fc6 a3=0 items=0 ppid=1725 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 key=(null) May 10 01:18:34.728000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31372E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 01:18:34.730000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:18:34.730000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00762aa80 a2=fc6 a3=0 items=0 ppid=1725 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 key=(null) May 10 01:18:34.730000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31372E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 01:18:34.731000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526356 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:18:34.731000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c007951b00 a2=fc6 a3=0 items=0 ppid=1725 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 key=(null) May 10 01:18:34.731000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31372E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 01:18:34.754000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:18:34.754000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c007a3b4a0 a2=fc6 a3=0 items=0 ppid=1725 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 key=(null) May 10 01:18:34.754000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31372E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 01:18:34.801000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:18:34.801000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c007a3b5f0 a2=fc6 a3=0 items=0 ppid=1725 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 key=(null) May 10 01:18:34.801000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31372E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 01:18:34.811000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:18:34.811000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c0074257e0 a2=fc6 a3=0 items=0 ppid=1725 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c658 key=(null) May 10 01:18:34.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31372E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 01:18:37.449177 systemd[1]: Started sshd@17-10.244.17.126:22-139.178.68.195:56392.service. May 10 01:18:37.455382 kernel: kauditd_printk_skb: 25 callbacks suppressed May 10 01:18:37.455445 kernel: audit: type=1130 audit(1746839917.448:1461): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.17.126:22-139.178.68.195:56392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:37.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.17.126:22-139.178.68.195:56392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:38.372000 audit[4923]: USER_ACCT pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:38.373677 sshd[4923]: Accepted publickey for core from 139.178.68.195 port 56392 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:18:38.379000 audit[4923]: CRED_ACQ pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:38.381515 sshd[4923]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:18:38.386832 kernel: audit: type=1101 audit(1746839918.372:1462): pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:38.386973 kernel: audit: type=1103 audit(1746839918.379:1463): pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:38.391432 kernel: audit: type=1006 audit(1746839918.379:1464): pid=4923 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 10 01:18:38.391539 kernel: audit: type=1300 audit(1746839918.379:1464): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc83b3cc50 a2=3 a3=0 items=0 ppid=1 pid=4923 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:38.379000 audit[4923]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc83b3cc50 a2=3 a3=0 items=0 ppid=1 pid=4923 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:38.394599 systemd[1]: Started session-18.scope. May 10 01:18:38.396857 systemd-logind[1185]: New session 18 of user core. May 10 01:18:38.379000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:18:38.401148 kernel: audit: type=1327 audit(1746839918.379:1464): proctitle=737368643A20636F7265205B707269765D May 10 01:18:38.407000 audit[4923]: USER_START pid=4923 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:38.410000 audit[4925]: CRED_ACQ pid=4925 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:38.421535 kernel: audit: type=1105 audit(1746839918.407:1465): pid=4923 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:38.421650 kernel: audit: type=1103 audit(1746839918.410:1466): pid=4925 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:39.146807 sshd[4923]: pam_unix(sshd:session): session closed for user core May 10 01:18:39.147000 audit[4923]: USER_END pid=4923 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:39.166173 kernel: audit: type=1106 audit(1746839919.147:1467): pid=4923 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:39.166368 kernel: audit: type=1104 audit(1746839919.148:1468): pid=4923 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:39.148000 audit[4923]: CRED_DISP pid=4923 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:39.158076 systemd[1]: sshd@17-10.244.17.126:22-139.178.68.195:56392.service: Deactivated successfully. May 10 01:18:39.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.17.126:22-139.178.68.195:56392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:39.159414 systemd[1]: session-18.scope: Deactivated successfully. May 10 01:18:39.170545 systemd-logind[1185]: Session 18 logged out. Waiting for processes to exit. May 10 01:18:39.171839 systemd-logind[1185]: Removed session 18. May 10 01:18:39.391000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:18:39.391000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0024ca380 a2=fc6 a3=0 items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 key=(null) May 10 01:18:39.391000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:18:39.392000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:18:39.392000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0024ca3a0 a2=fc6 a3=0 items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 key=(null) May 10 01:18:39.392000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:18:39.400000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:18:39.400000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00260ade0 a2=fc6 a3=0 items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 key=(null) May 10 01:18:39.400000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:18:39.400000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:18:39.400000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00260ae00 a2=fc6 a3=0 items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c625 key=(null) May 10 01:18:39.400000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:18:41.021604 systemd[1]: run-containerd-runc-k8s.io-8e062c4815713189d2d3dbf99d5ae23c576453d3acfcd6cf3ad1e37e308566f5-runc.4pmwpr.mount: Deactivated successfully. May 10 01:18:43.084174 kernel: kauditd_printk_skb: 13 callbacks suppressed May 10 01:18:43.084483 kernel: audit: type=1400 audit(1746839923.074:1474): avc: denied { watch } for pid=4270 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_01_17_07.3474691932/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c634,c939 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c634,c939 tclass=file permissive=0 May 10 01:18:43.074000 audit[4270]: AVC avc: denied { watch } for pid=4270 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_01_17_07.3474691932/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c634,c939 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c634,c939 tclass=file permissive=0 May 10 01:18:43.074000 audit[4270]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000cbc080 a2=fc6 a3=0 items=0 ppid=3817 pid=4270 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c634,c939 key=(null) May 10 01:18:43.074000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 01:18:43.100769 kernel: audit: type=1300 audit(1746839923.074:1474): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000cbc080 a2=fc6 a3=0 items=0 ppid=3817 pid=4270 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c634,c939 key=(null) May 10 01:18:43.100999 kernel: audit: type=1327 audit(1746839923.074:1474): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 01:18:43.755000 audit[4331]: AVC avc: denied { watch } for pid=4331 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_01_17_07.2525071533/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c166,c399 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c166,c399 tclass=file permissive=0 May 10 01:18:43.763744 kernel: audit: type=1400 audit(1746839923.755:1475): avc: denied { watch } for pid=4331 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_01_17_07.2525071533/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c166,c399 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c166,c399 tclass=file permissive=0 May 10 01:18:43.755000 audit[4331]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c26dc0 a2=fc6 a3=0 items=0 ppid=3870 pid=4331 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c166,c399 key=(null) May 10 01:18:43.773816 kernel: audit: type=1300 audit(1746839923.755:1475): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c26dc0 a2=fc6 a3=0 items=0 ppid=3870 pid=4331 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c166,c399 key=(null) May 10 01:18:43.755000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 01:18:43.781733 kernel: audit: type=1327 audit(1746839923.755:1475): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 01:18:44.299766 systemd[1]: Started sshd@18-10.244.17.126:22-139.178.68.195:56398.service. May 10 01:18:44.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.17.126:22-139.178.68.195:56398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:44.311929 kernel: audit: type=1130 audit(1746839924.300:1476): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.17.126:22-139.178.68.195:56398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:45.243234 sshd[4980]: Accepted publickey for core from 139.178.68.195 port 56398 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:18:45.242000 audit[4980]: USER_ACCT pid=4980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:45.252757 kernel: audit: type=1101 audit(1746839925.242:1477): pid=4980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:45.252000 audit[4980]: CRED_ACQ pid=4980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:45.255676 sshd[4980]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:18:45.266394 kernel: audit: type=1103 audit(1746839925.252:1478): pid=4980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:45.266561 kernel: audit: type=1006 audit(1746839925.253:1479): pid=4980 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 May 10 01:18:45.253000 audit[4980]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0a90e2e0 a2=3 a3=0 items=0 ppid=1 pid=4980 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:45.253000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:18:45.274139 systemd-logind[1185]: New session 19 of user core. May 10 01:18:45.275656 systemd[1]: Started session-19.scope. May 10 01:18:45.286000 audit[4980]: USER_START pid=4980 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:45.289000 audit[4982]: CRED_ACQ pid=4982 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:46.165280 sshd[4980]: pam_unix(sshd:session): session closed for user core May 10 01:18:46.171000 audit[4980]: USER_END pid=4980 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:46.172000 audit[4980]: CRED_DISP pid=4980 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:46.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.17.126:22-139.178.68.195:56398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:46.175433 systemd[1]: sshd@18-10.244.17.126:22-139.178.68.195:56398.service: Deactivated successfully. May 10 01:18:46.177771 systemd[1]: session-19.scope: Deactivated successfully. May 10 01:18:46.179196 systemd-logind[1185]: Session 19 logged out. Waiting for processes to exit. May 10 01:18:46.181179 systemd-logind[1185]: Removed session 19. May 10 01:18:46.316074 systemd[1]: Started sshd@19-10.244.17.126:22-139.178.68.195:40942.service. May 10 01:18:46.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.17.126:22-139.178.68.195:40942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:47.208985 sshd[4998]: Accepted publickey for core from 139.178.68.195 port 40942 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:18:47.208000 audit[4998]: USER_ACCT pid=4998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:47.210000 audit[4998]: CRED_ACQ pid=4998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:47.210000 audit[4998]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2ffb75c0 a2=3 a3=0 items=0 ppid=1 pid=4998 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:47.210000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:18:47.212435 sshd[4998]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:18:47.220831 systemd-logind[1185]: New session 20 of user core. May 10 01:18:47.221751 systemd[1]: Started session-20.scope. May 10 01:18:47.229000 audit[4998]: USER_START pid=4998 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:47.232000 audit[5002]: CRED_ACQ pid=5002 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:48.424808 sshd[4998]: pam_unix(sshd:session): session closed for user core May 10 01:18:48.427000 audit[4998]: USER_END pid=4998 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:48.433032 kernel: kauditd_printk_skb: 15 callbacks suppressed May 10 01:18:48.433300 kernel: audit: type=1106 audit(1746839928.427:1491): pid=4998 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:48.431000 audit[4998]: CRED_DISP pid=4998 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:48.447761 kernel: audit: type=1104 audit(1746839928.431:1492): pid=4998 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:48.449900 systemd[1]: sshd@19-10.244.17.126:22-139.178.68.195:40942.service: Deactivated successfully. May 10 01:18:48.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.17.126:22-139.178.68.195:40942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:48.451670 systemd[1]: session-20.scope: Deactivated successfully. May 10 01:18:48.457773 kernel: audit: type=1131 audit(1746839928.449:1493): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.17.126:22-139.178.68.195:40942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:48.458387 systemd-logind[1185]: Session 20 logged out. Waiting for processes to exit. May 10 01:18:48.460850 systemd-logind[1185]: Removed session 20. May 10 01:18:48.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.17.126:22-139.178.68.195:40950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:48.578748 systemd[1]: Started sshd@20-10.244.17.126:22-139.178.68.195:40950.service. May 10 01:18:48.585745 kernel: audit: type=1130 audit(1746839928.578:1494): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.17.126:22-139.178.68.195:40950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:49.496000 audit[5010]: USER_ACCT pid=5010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:49.497702 sshd[5010]: Accepted publickey for core from 139.178.68.195 port 40950 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:18:49.504843 sshd[5010]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:18:49.499000 audit[5010]: CRED_ACQ pid=5010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:49.514790 kernel: audit: type=1101 audit(1746839929.496:1495): pid=5010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:49.515222 kernel: audit: type=1103 audit(1746839929.499:1496): pid=5010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:49.521194 kernel: audit: type=1006 audit(1746839929.499:1497): pid=5010 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 10 01:18:49.499000 audit[5010]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecefe1100 a2=3 a3=0 items=0 ppid=1 pid=5010 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:49.529344 systemd[1]: Started session-21.scope. May 10 01:18:49.532689 systemd-logind[1185]: New session 21 of user core. May 10 01:18:49.535068 kernel: audit: type=1300 audit(1746839929.499:1497): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecefe1100 a2=3 a3=0 items=0 ppid=1 pid=5010 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:49.499000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:18:49.538793 kernel: audit: type=1327 audit(1746839929.499:1497): proctitle=737368643A20636F7265205B707269765D May 10 01:18:49.543000 audit[5010]: USER_START pid=5010 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:49.543000 audit[5012]: CRED_ACQ pid=5012 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:49.553167 kernel: audit: type=1105 audit(1746839929.543:1498): pid=5010 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:53.463000 audit[5023]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=5023 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:18:53.503102 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 01:18:53.510979 kernel: audit: type=1325 audit(1746839933.463:1500): table=filter:121 family=2 entries=20 op=nft_register_rule pid=5023 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:18:53.519325 kernel: audit: type=1300 audit(1746839933.463:1500): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe8287b270 a2=0 a3=7ffe8287b25c items=0 ppid=2163 pid=5023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:53.519441 kernel: audit: type=1106 audit(1746839933.493:1501): pid=5010 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:53.521453 kernel: audit: type=1104 audit(1746839933.494:1502): pid=5010 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:53.521542 kernel: audit: type=1131 audit(1746839933.515:1503): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.17.126:22-139.178.68.195:40950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:53.463000 audit[5023]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe8287b270 a2=0 a3=7ffe8287b25c items=0 ppid=2163 pid=5023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:53.493000 audit[5010]: USER_END pid=5010 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:53.494000 audit[5010]: CRED_DISP pid=5010 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:53.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.17.126:22-139.178.68.195:40950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:53.476232 sshd[5010]: pam_unix(sshd:session): session closed for user core May 10 01:18:53.463000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:18:53.515451 systemd[1]: sshd@20-10.244.17.126:22-139.178.68.195:40950.service: Deactivated successfully. May 10 01:18:53.518376 systemd[1]: session-21.scope: Deactivated successfully. May 10 01:18:53.538951 kernel: audit: type=1327 audit(1746839933.463:1500): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:18:53.519371 systemd-logind[1185]: Session 21 logged out. Waiting for processes to exit. May 10 01:18:53.530608 systemd-logind[1185]: Removed session 21. May 10 01:18:53.541000 audit[5023]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=5023 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:18:53.546769 kernel: audit: type=1325 audit(1746839933.541:1504): table=nat:122 family=2 entries=22 op=nft_register_rule pid=5023 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:18:53.546960 kernel: audit: type=1300 audit(1746839933.541:1504): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe8287b270 a2=0 a3=0 items=0 ppid=2163 pid=5023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:53.541000 audit[5023]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe8287b270 a2=0 a3=0 items=0 ppid=2163 pid=5023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:53.541000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:18:53.560016 kernel: audit: type=1327 audit(1746839933.541:1504): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:18:53.583000 audit[5026]: NETFILTER_CFG table=filter:123 family=2 entries=32 op=nft_register_rule pid=5026 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:18:53.590815 kernel: audit: type=1325 audit(1746839933.583:1505): table=filter:123 family=2 entries=32 op=nft_register_rule pid=5026 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:18:53.583000 audit[5026]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff47bff9c0 a2=0 a3=7fff47bff9ac items=0 ppid=2163 pid=5026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:53.583000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:18:53.601000 audit[5026]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5026 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:18:53.601000 audit[5026]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff47bff9c0 a2=0 a3=0 items=0 ppid=2163 pid=5026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:53.601000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:18:53.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.17.126:22-139.178.68.195:40954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:53.612314 systemd[1]: Started sshd@21-10.244.17.126:22-139.178.68.195:40954.service. May 10 01:18:54.573000 audit[5028]: USER_ACCT pid=5028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:54.575646 sshd[5028]: Accepted publickey for core from 139.178.68.195 port 40954 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:18:54.575000 audit[5028]: CRED_ACQ pid=5028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:54.575000 audit[5028]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb41748a0 a2=3 a3=0 items=0 ppid=1 pid=5028 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:54.575000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:18:54.579285 sshd[5028]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:18:54.591518 systemd[1]: Started session-22.scope. May 10 01:18:54.593107 systemd-logind[1185]: New session 22 of user core. May 10 01:18:54.600000 audit[5028]: USER_START pid=5028 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:54.603000 audit[5031]: CRED_ACQ pid=5031 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:56.051257 sshd[5028]: pam_unix(sshd:session): session closed for user core May 10 01:18:56.052000 audit[5028]: USER_END pid=5028 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:56.052000 audit[5028]: CRED_DISP pid=5028 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:56.056742 systemd-logind[1185]: Session 22 logged out. Waiting for processes to exit. May 10 01:18:56.057359 systemd[1]: sshd@21-10.244.17.126:22-139.178.68.195:40954.service: Deactivated successfully. May 10 01:18:56.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.17.126:22-139.178.68.195:40954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:56.058548 systemd[1]: session-22.scope: Deactivated successfully. May 10 01:18:56.060616 systemd-logind[1185]: Removed session 22. May 10 01:18:56.239749 systemd[1]: Started sshd@22-10.244.17.126:22-139.178.68.195:50540.service. May 10 01:18:56.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.17.126:22-139.178.68.195:50540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:57.201000 audit[5039]: USER_ACCT pid=5039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:57.203421 sshd[5039]: Accepted publickey for core from 139.178.68.195 port 50540 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:18:57.203000 audit[5039]: CRED_ACQ pid=5039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:57.203000 audit[5039]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe5d62e00 a2=3 a3=0 items=0 ppid=1 pid=5039 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:18:57.203000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:18:57.206512 sshd[5039]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:18:57.214488 systemd-logind[1185]: New session 23 of user core. May 10 01:18:57.215662 systemd[1]: Started session-23.scope. May 10 01:18:57.223000 audit[5039]: USER_START pid=5039 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:57.226000 audit[5043]: CRED_ACQ pid=5043 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:58.031698 sshd[5039]: pam_unix(sshd:session): session closed for user core May 10 01:18:58.031000 audit[5039]: USER_END pid=5039 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:58.031000 audit[5039]: CRED_DISP pid=5039 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:18:58.036387 systemd-logind[1185]: Session 23 logged out. Waiting for processes to exit. May 10 01:18:58.036785 systemd[1]: sshd@22-10.244.17.126:22-139.178.68.195:50540.service: Deactivated successfully. May 10 01:18:58.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.17.126:22-139.178.68.195:50540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:18:58.037984 systemd[1]: session-23.scope: Deactivated successfully. May 10 01:18:58.039680 systemd-logind[1185]: Removed session 23. May 10 01:19:03.185793 systemd[1]: Started sshd@23-10.244.17.126:22-139.178.68.195:50542.service. May 10 01:19:03.223433 kernel: kauditd_printk_skb: 27 callbacks suppressed May 10 01:19:03.223678 kernel: audit: type=1130 audit(1746839943.184:1525): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.17.126:22-139.178.68.195:50542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:19:03.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.17.126:22-139.178.68.195:50542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:19:03.348000 audit[5092]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=5092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:19:03.348000 audit[5092]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd7a26f330 a2=0 a3=7ffd7a26f31c items=0 ppid=2163 pid=5092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:19:03.368232 kernel: audit: type=1325 audit(1746839943.348:1526): table=filter:125 family=2 entries=20 op=nft_register_rule pid=5092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:19:03.368427 kernel: audit: type=1300 audit(1746839943.348:1526): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd7a26f330 a2=0 a3=7ffd7a26f31c items=0 ppid=2163 pid=5092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:19:03.368886 kernel: audit: type=1327 audit(1746839943.348:1526): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:19:03.348000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:19:03.370000 audit[5092]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=5092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:19:03.370000 audit[5092]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd7a26f330 a2=0 a3=7ffd7a26f31c items=0 ppid=2163 pid=5092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:19:03.386214 kernel: audit: type=1325 audit(1746839943.370:1527): table=nat:126 family=2 entries=106 op=nft_register_chain pid=5092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:19:03.386430 kernel: audit: type=1300 audit(1746839943.370:1527): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd7a26f330 a2=0 a3=7ffd7a26f31c items=0 ppid=2163 pid=5092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:19:03.386512 kernel: audit: type=1327 audit(1746839943.370:1527): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:19:03.370000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:19:04.162000 audit[5089]: USER_ACCT pid=5089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:04.165255 sshd[5089]: Accepted publickey for core from 139.178.68.195 port 50542 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:19:04.174979 kernel: audit: type=1101 audit(1746839944.162:1528): pid=5089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:04.174000 audit[5089]: CRED_ACQ pid=5089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:04.187431 kernel: audit: type=1103 audit(1746839944.174:1529): pid=5089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:04.188241 kernel: audit: type=1006 audit(1746839944.174:1530): pid=5089 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 10 01:19:04.174000 audit[5089]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc78367cc0 a2=3 a3=0 items=0 ppid=1 pid=5089 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:19:04.174000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:19:04.188210 sshd[5089]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:19:04.199870 systemd-logind[1185]: New session 24 of user core. May 10 01:19:04.200468 systemd[1]: Started session-24.scope. May 10 01:19:04.208000 audit[5089]: USER_START pid=5089 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:04.211000 audit[5094]: CRED_ACQ pid=5094 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:04.962311 sshd[5089]: pam_unix(sshd:session): session closed for user core May 10 01:19:04.962000 audit[5089]: USER_END pid=5089 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:04.962000 audit[5089]: CRED_DISP pid=5089 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:04.966318 systemd[1]: sshd@23-10.244.17.126:22-139.178.68.195:50542.service: Deactivated successfully. May 10 01:19:04.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.17.126:22-139.178.68.195:50542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:19:04.968058 systemd[1]: session-24.scope: Deactivated successfully. May 10 01:19:04.969042 systemd-logind[1185]: Session 24 logged out. Waiting for processes to exit. May 10 01:19:04.970545 systemd-logind[1185]: Removed session 24. May 10 01:19:10.104630 systemd[1]: Started sshd@24-10.244.17.126:22-139.178.68.195:36756.service. May 10 01:19:10.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.17.126:22-139.178.68.195:36756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:19:10.107348 kernel: kauditd_printk_skb: 7 callbacks suppressed May 10 01:19:10.107494 kernel: audit: type=1130 audit(1746839950.104:1536): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.17.126:22-139.178.68.195:36756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:19:11.008601 systemd[1]: run-containerd-runc-k8s.io-8e062c4815713189d2d3dbf99d5ae23c576453d3acfcd6cf3ad1e37e308566f5-runc.hvXO0O.mount: Deactivated successfully. May 10 01:19:11.019000 audit[5125]: USER_ACCT pid=5125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:11.024829 sshd[5125]: Accepted publickey for core from 139.178.68.195 port 36756 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:19:11.029738 kernel: audit: type=1101 audit(1746839951.019:1537): pid=5125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:11.028000 audit[5125]: CRED_ACQ pid=5125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:11.032218 sshd[5125]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:19:11.041244 kernel: audit: type=1103 audit(1746839951.028:1538): pid=5125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:11.041410 kernel: audit: type=1006 audit(1746839951.028:1539): pid=5125 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 10 01:19:11.028000 audit[5125]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff994cd990 a2=3 a3=0 items=0 ppid=1 pid=5125 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:19:11.050789 kernel: audit: type=1300 audit(1746839951.028:1539): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff994cd990 a2=3 a3=0 items=0 ppid=1 pid=5125 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:19:11.028000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:19:11.054924 kernel: audit: type=1327 audit(1746839951.028:1539): proctitle=737368643A20636F7265205B707269765D May 10 01:19:11.059768 systemd[1]: Started session-25.scope. May 10 01:19:11.060951 systemd-logind[1185]: New session 25 of user core. May 10 01:19:11.073000 audit[5125]: USER_START pid=5125 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:11.082745 kernel: audit: type=1105 audit(1746839951.073:1540): pid=5125 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:11.083000 audit[5143]: CRED_ACQ pid=5143 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:11.092755 kernel: audit: type=1103 audit(1746839951.083:1541): pid=5143 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:11.917225 sshd[5125]: pam_unix(sshd:session): session closed for user core May 10 01:19:11.917000 audit[5125]: USER_END pid=5125 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:11.925000 audit[5125]: CRED_DISP pid=5125 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:11.929949 systemd[1]: sshd@24-10.244.17.126:22-139.178.68.195:36756.service: Deactivated successfully. May 10 01:19:11.931104 systemd[1]: session-25.scope: Deactivated successfully. May 10 01:19:11.933813 kernel: audit: type=1106 audit(1746839951.917:1542): pid=5125 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:11.934333 kernel: audit: type=1104 audit(1746839951.925:1543): pid=5125 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:11.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.17.126:22-139.178.68.195:36756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:19:11.934869 systemd-logind[1185]: Session 25 logged out. Waiting for processes to exit. May 10 01:19:11.936194 systemd-logind[1185]: Removed session 25. May 10 01:19:17.075342 systemd[1]: Started sshd@25-10.244.17.126:22-139.178.68.195:43280.service. May 10 01:19:17.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.244.17.126:22-139.178.68.195:43280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:19:17.081279 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 01:19:17.081420 kernel: audit: type=1130 audit(1746839957.074:1545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.244.17.126:22-139.178.68.195:43280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:19:18.055000 audit[5161]: USER_ACCT pid=5161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:18.057393 sshd[5161]: Accepted publickey for core from 139.178.68.195 port 43280 ssh2: RSA SHA256:YQmh9kay2Fbwp/WeJvefEh7C1hXKeGuPiyso2bRkh84 May 10 01:19:18.063763 kernel: audit: type=1101 audit(1746839958.055:1546): pid=5161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:18.063000 audit[5161]: CRED_ACQ pid=5161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:18.076489 kernel: audit: type=1103 audit(1746839958.063:1547): pid=5161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:18.076617 kernel: audit: type=1006 audit(1746839958.064:1548): pid=5161 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 10 01:19:18.064000 audit[5161]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff72515400 a2=3 a3=0 items=0 ppid=1 pid=5161 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:19:18.078310 sshd[5161]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:19:18.064000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:19:18.086310 kernel: audit: type=1300 audit(1746839958.064:1548): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff72515400 a2=3 a3=0 items=0 ppid=1 pid=5161 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:19:18.086411 kernel: audit: type=1327 audit(1746839958.064:1548): proctitle=737368643A20636F7265205B707269765D May 10 01:19:18.092793 systemd-logind[1185]: New session 26 of user core. May 10 01:19:18.094835 systemd[1]: Started session-26.scope. May 10 01:19:18.102000 audit[5161]: USER_START pid=5161 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:18.117211 kernel: audit: type=1105 audit(1746839958.102:1549): pid=5161 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:18.117410 kernel: audit: type=1103 audit(1746839958.114:1550): pid=5163 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:18.114000 audit[5163]: CRED_ACQ pid=5163 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:18.987922 sshd[5161]: pam_unix(sshd:session): session closed for user core May 10 01:19:18.990000 audit[5161]: USER_END pid=5161 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:18.999815 kernel: audit: type=1106 audit(1746839958.990:1551): pid=5161 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:18.990000 audit[5161]: CRED_DISP pid=5161 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:19.006884 kernel: audit: type=1104 audit(1746839958.990:1552): pid=5161 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 01:19:19.012266 systemd[1]: sshd@25-10.244.17.126:22-139.178.68.195:43280.service: Deactivated successfully. May 10 01:19:19.014055 systemd[1]: session-26.scope: Deactivated successfully. May 10 01:19:19.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.244.17.126:22-139.178.68.195:43280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:19:19.015407 systemd-logind[1185]: Session 26 logged out. Waiting for processes to exit. May 10 01:19:19.018158 systemd-logind[1185]: Removed session 26.