May 10 00:43:44.001290 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 00:43:44.001327 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:43:44.001344 kernel: BIOS-provided physical RAM map: May 10 00:43:44.001354 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 10 00:43:44.001363 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 10 00:43:44.001372 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 10 00:43:44.001383 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdafff] usable May 10 00:43:44.001393 kernel: BIOS-e820: [mem 0x000000007ffdb000-0x000000007fffffff] reserved May 10 00:43:44.001407 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 10 00:43:44.001416 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 10 00:43:44.001426 kernel: NX (Execute Disable) protection: active May 10 00:43:44.001435 kernel: SMBIOS 2.8 present. May 10 00:43:44.001445 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 May 10 00:43:44.001455 kernel: Hypervisor detected: KVM May 10 00:43:44.001468 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 10 00:43:44.001482 kernel: kvm-clock: cpu 0, msr 60196001, primary cpu clock May 10 00:43:44.001492 kernel: kvm-clock: using sched offset of 4208423125 cycles May 10 00:43:44.001500 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 10 00:43:44.001512 kernel: tsc: Detected 2494.140 MHz processor May 10 00:43:44.001520 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 00:43:44.001527 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 00:43:44.001535 kernel: last_pfn = 0x7ffdb max_arch_pfn = 0x400000000 May 10 00:43:44.001542 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 00:43:44.001552 kernel: ACPI: Early table checksum verification disabled May 10 00:43:44.001558 kernel: ACPI: RSDP 0x00000000000F5950 000014 (v00 BOCHS ) May 10 00:43:44.001566 kernel: ACPI: RSDT 0x000000007FFE1986 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:43:44.001573 kernel: ACPI: FACP 0x000000007FFE176A 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:43:44.001580 kernel: ACPI: DSDT 0x000000007FFE0040 00172A (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:43:44.001587 kernel: ACPI: FACS 0x000000007FFE0000 000040 May 10 00:43:44.001594 kernel: ACPI: APIC 0x000000007FFE17DE 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:43:44.001602 kernel: ACPI: HPET 0x000000007FFE185E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:43:44.001609 kernel: ACPI: SRAT 0x000000007FFE1896 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:43:44.001619 kernel: ACPI: WAET 0x000000007FFE195E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:43:44.001626 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe176a-0x7ffe17dd] May 10 00:43:44.001633 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe1769] May 10 00:43:44.001640 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] May 10 00:43:44.001647 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17de-0x7ffe185d] May 10 00:43:44.001654 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe185e-0x7ffe1895] May 10 00:43:44.001661 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe1896-0x7ffe195d] May 10 00:43:44.001669 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe195e-0x7ffe1985] May 10 00:43:44.001682 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 10 00:43:44.001690 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 10 00:43:44.001697 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 10 00:43:44.001705 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] May 10 00:43:44.001713 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdafff] -> [mem 0x00000000-0x7ffdafff] May 10 00:43:44.001721 kernel: NODE_DATA(0) allocated [mem 0x7ffd5000-0x7ffdafff] May 10 00:43:44.001731 kernel: Zone ranges: May 10 00:43:44.001739 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 00:43:44.001747 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdafff] May 10 00:43:44.001754 kernel: Normal empty May 10 00:43:44.001762 kernel: Movable zone start for each node May 10 00:43:44.001770 kernel: Early memory node ranges May 10 00:43:44.001777 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 10 00:43:44.001785 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdafff] May 10 00:43:44.001793 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdafff] May 10 00:43:44.001803 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:43:44.001814 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 10 00:43:44.001822 kernel: On node 0, zone DMA32: 37 pages in unavailable ranges May 10 00:43:44.001830 kernel: ACPI: PM-Timer IO Port: 0x608 May 10 00:43:44.001838 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 10 00:43:44.001860 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 10 00:43:44.001868 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 10 00:43:44.001875 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 10 00:43:44.001883 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 10 00:43:44.001894 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 10 00:43:44.001904 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 10 00:43:44.001912 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 00:43:44.001920 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 10 00:43:44.001928 kernel: TSC deadline timer available May 10 00:43:44.001936 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 10 00:43:44.001943 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices May 10 00:43:44.001951 kernel: Booting paravirtualized kernel on KVM May 10 00:43:44.001959 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 00:43:44.001970 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 10 00:43:44.001994 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 10 00:43:44.002007 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 10 00:43:44.002033 kernel: pcpu-alloc: [0] 0 1 May 10 00:43:44.002043 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 May 10 00:43:44.002053 kernel: kvm-guest: PV spinlocks disabled, no host support May 10 00:43:44.002066 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515803 May 10 00:43:44.002077 kernel: Policy zone: DMA32 May 10 00:43:44.002090 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:43:44.002106 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 00:43:44.002117 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 10 00:43:44.002129 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 10 00:43:44.002140 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 00:43:44.002152 kernel: Memory: 1973276K/2096612K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 123076K reserved, 0K cma-reserved) May 10 00:43:44.002164 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 10 00:43:44.002176 kernel: Kernel/User page tables isolation: enabled May 10 00:43:44.002187 kernel: ftrace: allocating 34584 entries in 136 pages May 10 00:43:44.002204 kernel: ftrace: allocated 136 pages with 2 groups May 10 00:43:44.002216 kernel: rcu: Hierarchical RCU implementation. May 10 00:43:44.002228 kernel: rcu: RCU event tracing is enabled. May 10 00:43:44.002240 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 10 00:43:44.002252 kernel: Rude variant of Tasks RCU enabled. May 10 00:43:44.002263 kernel: Tracing variant of Tasks RCU enabled. May 10 00:43:44.002273 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 00:43:44.002281 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 10 00:43:44.002289 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 10 00:43:44.002300 kernel: random: crng init done May 10 00:43:44.002308 kernel: Console: colour VGA+ 80x25 May 10 00:43:44.002315 kernel: printk: console [tty0] enabled May 10 00:43:44.002323 kernel: printk: console [ttyS0] enabled May 10 00:43:44.002331 kernel: ACPI: Core revision 20210730 May 10 00:43:44.002339 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 10 00:43:44.002348 kernel: APIC: Switch to symmetric I/O mode setup May 10 00:43:44.002355 kernel: x2apic enabled May 10 00:43:44.002363 kernel: Switched APIC routing to physical x2apic. May 10 00:43:44.002374 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 10 00:43:44.002382 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x23f39a1d859, max_idle_ns: 440795326830 ns May 10 00:43:44.002390 kernel: Calibrating delay loop (skipped) preset value.. 4988.28 BogoMIPS (lpj=2494140) May 10 00:43:44.002411 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 May 10 00:43:44.002424 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 May 10 00:43:44.002435 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 00:43:44.002446 kernel: Spectre V2 : Mitigation: Retpolines May 10 00:43:44.002456 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 10 00:43:44.002468 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls May 10 00:43:44.002484 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 10 00:43:44.002507 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 10 00:43:44.002520 kernel: MDS: Mitigation: Clear CPU buffers May 10 00:43:44.002533 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 10 00:43:44.002542 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 10 00:43:44.002550 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 10 00:43:44.002558 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 10 00:43:44.002566 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 10 00:43:44.002575 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 10 00:43:44.002583 kernel: Freeing SMP alternatives memory: 32K May 10 00:43:44.002594 kernel: pid_max: default: 32768 minimum: 301 May 10 00:43:44.002602 kernel: LSM: Security Framework initializing May 10 00:43:44.002611 kernel: SELinux: Initializing. May 10 00:43:44.002619 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 10 00:43:44.002627 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 10 00:43:44.002636 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x4f, stepping: 0x1) May 10 00:43:44.002646 kernel: Performance Events: unsupported p6 CPU model 79 no PMU driver, software events only. May 10 00:43:44.002655 kernel: signal: max sigframe size: 1776 May 10 00:43:44.002663 kernel: rcu: Hierarchical SRCU implementation. May 10 00:43:44.002671 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 10 00:43:44.002680 kernel: smp: Bringing up secondary CPUs ... May 10 00:43:44.002688 kernel: x86: Booting SMP configuration: May 10 00:43:44.002695 kernel: .... node #0, CPUs: #1 May 10 00:43:44.002704 kernel: kvm-clock: cpu 1, msr 60196041, secondary cpu clock May 10 00:43:44.002712 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 May 10 00:43:44.002720 kernel: smp: Brought up 1 node, 2 CPUs May 10 00:43:44.002731 kernel: smpboot: Max logical packages: 1 May 10 00:43:44.002739 kernel: smpboot: Total of 2 processors activated (9976.56 BogoMIPS) May 10 00:43:44.002747 kernel: devtmpfs: initialized May 10 00:43:44.002755 kernel: x86/mm: Memory block size: 128MB May 10 00:43:44.002796 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 00:43:44.002807 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 10 00:43:44.002819 kernel: pinctrl core: initialized pinctrl subsystem May 10 00:43:44.002831 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 00:43:44.002858 kernel: audit: initializing netlink subsys (disabled) May 10 00:43:44.002877 kernel: audit: type=2000 audit(1746837823.123:1): state=initialized audit_enabled=0 res=1 May 10 00:43:44.002889 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 00:43:44.002901 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 00:43:44.002914 kernel: cpuidle: using governor menu May 10 00:43:44.002926 kernel: ACPI: bus type PCI registered May 10 00:43:44.002940 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 00:43:44.002956 kernel: dca service started, version 1.12.1 May 10 00:43:44.002967 kernel: PCI: Using configuration type 1 for base access May 10 00:43:44.002980 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 00:43:44.002996 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 00:43:44.003005 kernel: ACPI: Added _OSI(Module Device) May 10 00:43:44.003014 kernel: ACPI: Added _OSI(Processor Device) May 10 00:43:44.003022 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 00:43:44.003032 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 00:43:44.003044 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 00:43:44.003052 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 00:43:44.003061 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 00:43:44.003069 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 10 00:43:44.003080 kernel: ACPI: Interpreter enabled May 10 00:43:44.003090 kernel: ACPI: PM: (supports S0 S5) May 10 00:43:44.003103 kernel: ACPI: Using IOAPIC for interrupt routing May 10 00:43:44.003113 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 00:43:44.003122 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 10 00:43:44.003130 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 10 00:43:44.003384 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 10 00:43:44.003484 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 10 00:43:44.003499 kernel: acpiphp: Slot [3] registered May 10 00:43:44.003508 kernel: acpiphp: Slot [4] registered May 10 00:43:44.003516 kernel: acpiphp: Slot [5] registered May 10 00:43:44.003525 kernel: acpiphp: Slot [6] registered May 10 00:43:44.003533 kernel: acpiphp: Slot [7] registered May 10 00:43:44.003542 kernel: acpiphp: Slot [8] registered May 10 00:43:44.003550 kernel: acpiphp: Slot [9] registered May 10 00:43:44.003559 kernel: acpiphp: Slot [10] registered May 10 00:43:44.003570 kernel: acpiphp: Slot [11] registered May 10 00:43:44.003578 kernel: acpiphp: Slot [12] registered May 10 00:43:44.003587 kernel: acpiphp: Slot [13] registered May 10 00:43:44.003595 kernel: acpiphp: Slot [14] registered May 10 00:43:44.003605 kernel: acpiphp: Slot [15] registered May 10 00:43:44.003617 kernel: acpiphp: Slot [16] registered May 10 00:43:44.003630 kernel: acpiphp: Slot [17] registered May 10 00:43:44.003642 kernel: acpiphp: Slot [18] registered May 10 00:43:44.003655 kernel: acpiphp: Slot [19] registered May 10 00:43:44.003667 kernel: acpiphp: Slot [20] registered May 10 00:43:44.003684 kernel: acpiphp: Slot [21] registered May 10 00:43:44.003697 kernel: acpiphp: Slot [22] registered May 10 00:43:44.003710 kernel: acpiphp: Slot [23] registered May 10 00:43:44.003723 kernel: acpiphp: Slot [24] registered May 10 00:43:44.003736 kernel: acpiphp: Slot [25] registered May 10 00:43:44.003745 kernel: acpiphp: Slot [26] registered May 10 00:43:44.003753 kernel: acpiphp: Slot [27] registered May 10 00:43:44.003762 kernel: acpiphp: Slot [28] registered May 10 00:43:44.003777 kernel: acpiphp: Slot [29] registered May 10 00:43:44.003793 kernel: acpiphp: Slot [30] registered May 10 00:43:44.003804 kernel: acpiphp: Slot [31] registered May 10 00:43:44.003816 kernel: PCI host bridge to bus 0000:00 May 10 00:43:44.004035 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 10 00:43:44.004128 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 10 00:43:44.004244 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 10 00:43:44.004333 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] May 10 00:43:44.004443 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] May 10 00:43:44.004564 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 10 00:43:44.004733 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 10 00:43:44.004895 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 10 00:43:44.005014 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 May 10 00:43:44.005104 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc1e0-0xc1ef] May 10 00:43:44.005199 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 10 00:43:44.005296 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 10 00:43:44.005384 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 10 00:43:44.005500 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 10 00:43:44.005641 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 May 10 00:43:44.005734 kernel: pci 0000:00:01.2: reg 0x20: [io 0xc180-0xc19f] May 10 00:43:44.005833 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 10 00:43:44.018198 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI May 10 00:43:44.018342 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB May 10 00:43:44.018502 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 May 10 00:43:44.018645 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] May 10 00:43:44.018800 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] May 10 00:43:44.018937 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebf0000-0xfebf0fff] May 10 00:43:44.019052 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] May 10 00:43:44.019165 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 10 00:43:44.019295 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 May 10 00:43:44.019405 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc1a0-0xc1bf] May 10 00:43:44.019496 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebf1000-0xfebf1fff] May 10 00:43:44.019598 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] May 10 00:43:44.019704 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 10 00:43:44.019804 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc1c0-0xc1df] May 10 00:43:44.019975 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebf2000-0xfebf2fff] May 10 00:43:44.020088 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] May 10 00:43:44.020214 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 May 10 00:43:44.020311 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc100-0xc13f] May 10 00:43:44.020425 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebf3000-0xfebf3fff] May 10 00:43:44.020535 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] May 10 00:43:44.020656 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 May 10 00:43:44.024053 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc07f] May 10 00:43:44.024196 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfebf4000-0xfebf4fff] May 10 00:43:44.024308 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] May 10 00:43:44.024468 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 May 10 00:43:44.024571 kernel: pci 0000:00:07.0: reg 0x10: [io 0xc080-0xc0ff] May 10 00:43:44.024661 kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfebf5000-0xfebf5fff] May 10 00:43:44.024751 kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfe814000-0xfe817fff 64bit pref] May 10 00:43:44.024944 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 May 10 00:43:44.025036 kernel: pci 0000:00:08.0: reg 0x10: [io 0xc140-0xc17f] May 10 00:43:44.025124 kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfe818000-0xfe81bfff 64bit pref] May 10 00:43:44.025136 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 10 00:43:44.025151 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 10 00:43:44.025164 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 10 00:43:44.025176 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 10 00:43:44.025195 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 10 00:43:44.025208 kernel: iommu: Default domain type: Translated May 10 00:43:44.025221 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 00:43:44.025363 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device May 10 00:43:44.025483 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 10 00:43:44.025572 kernel: pci 0000:00:02.0: vgaarb: bridge control possible May 10 00:43:44.025583 kernel: vgaarb: loaded May 10 00:43:44.025592 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 00:43:44.025606 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 00:43:44.025615 kernel: PTP clock support registered May 10 00:43:44.025624 kernel: PCI: Using ACPI for IRQ routing May 10 00:43:44.025632 kernel: PCI: pci_cache_line_size set to 64 bytes May 10 00:43:44.025642 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 10 00:43:44.025651 kernel: e820: reserve RAM buffer [mem 0x7ffdb000-0x7fffffff] May 10 00:43:44.025659 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 10 00:43:44.025668 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 10 00:43:44.025676 kernel: clocksource: Switched to clocksource kvm-clock May 10 00:43:44.025688 kernel: VFS: Disk quotas dquot_6.6.0 May 10 00:43:44.025697 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 00:43:44.025707 kernel: pnp: PnP ACPI init May 10 00:43:44.025721 kernel: pnp: PnP ACPI: found 4 devices May 10 00:43:44.025733 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 00:43:44.025745 kernel: NET: Registered PF_INET protocol family May 10 00:43:44.025758 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 10 00:43:44.025771 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 10 00:43:44.025786 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 00:43:44.025800 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 10 00:43:44.025809 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 10 00:43:44.025817 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 10 00:43:44.025826 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 10 00:43:44.025835 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 10 00:43:44.025855 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 00:43:44.025877 kernel: NET: Registered PF_XDP protocol family May 10 00:43:44.026056 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 10 00:43:44.026154 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 10 00:43:44.026241 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 10 00:43:44.026320 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] May 10 00:43:44.026435 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] May 10 00:43:44.026553 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release May 10 00:43:44.026651 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 10 00:43:44.026742 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 10 00:43:44.026755 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 10 00:43:44.026903 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x740 took 39707 usecs May 10 00:43:44.026923 kernel: PCI: CLS 0 bytes, default 64 May 10 00:43:44.026932 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 10 00:43:44.026941 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x23f39a1d859, max_idle_ns: 440795326830 ns May 10 00:43:44.026949 kernel: Initialise system trusted keyrings May 10 00:43:44.026959 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 10 00:43:44.026967 kernel: Key type asymmetric registered May 10 00:43:44.026976 kernel: Asymmetric key parser 'x509' registered May 10 00:43:44.026984 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 00:43:44.026995 kernel: io scheduler mq-deadline registered May 10 00:43:44.027004 kernel: io scheduler kyber registered May 10 00:43:44.027013 kernel: io scheduler bfq registered May 10 00:43:44.027021 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 00:43:44.027030 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 May 10 00:43:44.027038 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 10 00:43:44.027047 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 10 00:43:44.027055 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 00:43:44.027063 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 00:43:44.027072 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 10 00:43:44.027083 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 10 00:43:44.027091 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 10 00:43:44.027099 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 10 00:43:44.027211 kernel: rtc_cmos 00:03: RTC can wake from S4 May 10 00:43:44.027293 kernel: rtc_cmos 00:03: registered as rtc0 May 10 00:43:44.027373 kernel: rtc_cmos 00:03: setting system clock to 2025-05-10T00:43:43 UTC (1746837823) May 10 00:43:44.027457 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram May 10 00:43:44.027471 kernel: intel_pstate: CPU model not supported May 10 00:43:44.027480 kernel: NET: Registered PF_INET6 protocol family May 10 00:43:44.027488 kernel: Segment Routing with IPv6 May 10 00:43:44.027496 kernel: In-situ OAM (IOAM) with IPv6 May 10 00:43:44.027504 kernel: NET: Registered PF_PACKET protocol family May 10 00:43:44.027516 kernel: Key type dns_resolver registered May 10 00:43:44.027529 kernel: IPI shorthand broadcast: enabled May 10 00:43:44.027541 kernel: sched_clock: Marking stable (824607483, 149749593)->(1121626520, -147269444) May 10 00:43:44.027554 kernel: registered taskstats version 1 May 10 00:43:44.027570 kernel: Loading compiled-in X.509 certificates May 10 00:43:44.027583 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 00:43:44.027597 kernel: Key type .fscrypt registered May 10 00:43:44.027610 kernel: Key type fscrypt-provisioning registered May 10 00:43:44.027622 kernel: ima: No TPM chip found, activating TPM-bypass! May 10 00:43:44.027634 kernel: ima: Allocated hash algorithm: sha1 May 10 00:43:44.027646 kernel: ima: No architecture policies found May 10 00:43:44.027657 kernel: clk: Disabling unused clocks May 10 00:43:44.027669 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 00:43:44.027687 kernel: Write protecting the kernel read-only data: 28672k May 10 00:43:44.027699 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 00:43:44.027711 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 00:43:44.027725 kernel: Run /init as init process May 10 00:43:44.027737 kernel: with arguments: May 10 00:43:44.027750 kernel: /init May 10 00:43:44.027788 kernel: with environment: May 10 00:43:44.027804 kernel: HOME=/ May 10 00:43:44.027816 kernel: TERM=linux May 10 00:43:44.027831 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 00:43:44.027855 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:43:44.032937 systemd[1]: Detected virtualization kvm. May 10 00:43:44.032950 systemd[1]: Detected architecture x86-64. May 10 00:43:44.032959 systemd[1]: Running in initrd. May 10 00:43:44.032969 systemd[1]: No hostname configured, using default hostname. May 10 00:43:44.032987 systemd[1]: Hostname set to . May 10 00:43:44.033000 systemd[1]: Initializing machine ID from VM UUID. May 10 00:43:44.033010 systemd[1]: Queued start job for default target initrd.target. May 10 00:43:44.033019 systemd[1]: Started systemd-ask-password-console.path. May 10 00:43:44.033028 systemd[1]: Reached target cryptsetup.target. May 10 00:43:44.033037 systemd[1]: Reached target paths.target. May 10 00:43:44.033046 systemd[1]: Reached target slices.target. May 10 00:43:44.033055 systemd[1]: Reached target swap.target. May 10 00:43:44.033064 systemd[1]: Reached target timers.target. May 10 00:43:44.033077 systemd[1]: Listening on iscsid.socket. May 10 00:43:44.033086 systemd[1]: Listening on iscsiuio.socket. May 10 00:43:44.033095 systemd[1]: Listening on systemd-journald-audit.socket. May 10 00:43:44.033105 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 00:43:44.033114 systemd[1]: Listening on systemd-journald.socket. May 10 00:43:44.033123 systemd[1]: Listening on systemd-networkd.socket. May 10 00:43:44.033132 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:43:44.033141 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:43:44.033154 systemd[1]: Reached target sockets.target. May 10 00:43:44.033163 systemd[1]: Starting kmod-static-nodes.service... May 10 00:43:44.033173 systemd[1]: Finished network-cleanup.service. May 10 00:43:44.033185 systemd[1]: Starting systemd-fsck-usr.service... May 10 00:43:44.033194 systemd[1]: Starting systemd-journald.service... May 10 00:43:44.033203 systemd[1]: Starting systemd-modules-load.service... May 10 00:43:44.033215 systemd[1]: Starting systemd-resolved.service... May 10 00:43:44.033224 systemd[1]: Starting systemd-vconsole-setup.service... May 10 00:43:44.033234 systemd[1]: Finished kmod-static-nodes.service. May 10 00:43:44.033243 systemd[1]: Finished systemd-fsck-usr.service. May 10 00:43:44.033253 kernel: audit: type=1130 audit(1746837823.999:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.033264 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:43:44.033280 systemd-journald[183]: Journal started May 10 00:43:44.033364 systemd-journald[183]: Runtime Journal (/run/log/journal/cb54abce6b934139b86a74e274bc3a29) is 4.9M, max 39.5M, 34.5M free. May 10 00:43:43.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.019937 systemd-modules-load[184]: Inserted module 'overlay' May 10 00:43:44.040510 systemd-resolved[185]: Positive Trust Anchors: May 10 00:43:44.040519 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:43:44.056521 systemd[1]: Started systemd-journald.service. May 10 00:43:44.040554 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:43:44.067196 kernel: audit: type=1130 audit(1746837824.056:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.067234 kernel: audit: type=1130 audit(1746837824.062:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.067246 kernel: audit: type=1130 audit(1746837824.063:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.043484 systemd-resolved[185]: Defaulting to hostname 'linux'. May 10 00:43:44.057021 systemd[1]: Started systemd-resolved.service. May 10 00:43:44.063885 systemd[1]: Finished systemd-vconsole-setup.service. May 10 00:43:44.064502 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:43:44.070686 systemd[1]: Reached target nss-lookup.target. May 10 00:43:44.076316 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 00:43:44.076065 systemd[1]: Starting dracut-cmdline-ask.service... May 10 00:43:44.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.079891 kernel: audit: type=1130 audit(1746837824.070:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.088706 systemd-modules-load[184]: Inserted module 'br_netfilter' May 10 00:43:44.089369 kernel: Bridge firewalling registered May 10 00:43:44.092984 systemd[1]: Finished dracut-cmdline-ask.service. May 10 00:43:44.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.098945 kernel: audit: type=1130 audit(1746837824.092:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.099102 systemd[1]: Starting dracut-cmdline.service... May 10 00:43:44.115111 dracut-cmdline[203]: dracut-dracut-053 May 10 00:43:44.117892 kernel: SCSI subsystem initialized May 10 00:43:44.118508 dracut-cmdline[203]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:43:44.140032 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 00:43:44.140104 kernel: device-mapper: uevent: version 1.0.3 May 10 00:43:44.141313 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 00:43:44.144757 systemd-modules-load[184]: Inserted module 'dm_multipath' May 10 00:43:44.145535 systemd[1]: Finished systemd-modules-load.service. May 10 00:43:44.147144 systemd[1]: Starting systemd-sysctl.service... May 10 00:43:44.156187 kernel: audit: type=1130 audit(1746837824.145:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.158448 systemd[1]: Finished systemd-sysctl.service. May 10 00:43:44.161416 kernel: audit: type=1130 audit(1746837824.157:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.211902 kernel: Loading iSCSI transport class v2.0-870. May 10 00:43:44.233904 kernel: iscsi: registered transport (tcp) May 10 00:43:44.263609 kernel: iscsi: registered transport (qla4xxx) May 10 00:43:44.263699 kernel: QLogic iSCSI HBA Driver May 10 00:43:44.319680 systemd[1]: Finished dracut-cmdline.service. May 10 00:43:44.324916 kernel: audit: type=1130 audit(1746837824.319:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.321330 systemd[1]: Starting dracut-pre-udev.service... May 10 00:43:44.384944 kernel: raid6: avx2x4 gen() 14188 MB/s May 10 00:43:44.401933 kernel: raid6: avx2x4 xor() 5820 MB/s May 10 00:43:44.418965 kernel: raid6: avx2x2 gen() 14772 MB/s May 10 00:43:44.435911 kernel: raid6: avx2x2 xor() 15207 MB/s May 10 00:43:44.452941 kernel: raid6: avx2x1 gen() 11542 MB/s May 10 00:43:44.469927 kernel: raid6: avx2x1 xor() 12913 MB/s May 10 00:43:44.486918 kernel: raid6: sse2x4 gen() 11122 MB/s May 10 00:43:44.503915 kernel: raid6: sse2x4 xor() 6804 MB/s May 10 00:43:44.520919 kernel: raid6: sse2x2 gen() 11942 MB/s May 10 00:43:44.537945 kernel: raid6: sse2x2 xor() 7311 MB/s May 10 00:43:44.554930 kernel: raid6: sse2x1 gen() 10429 MB/s May 10 00:43:44.572297 kernel: raid6: sse2x1 xor() 5602 MB/s May 10 00:43:44.572400 kernel: raid6: using algorithm avx2x2 gen() 14772 MB/s May 10 00:43:44.572419 kernel: raid6: .... xor() 15207 MB/s, rmw enabled May 10 00:43:44.572964 kernel: raid6: using avx2x2 recovery algorithm May 10 00:43:44.587880 kernel: xor: automatically using best checksumming function avx May 10 00:43:44.706901 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 00:43:44.722313 systemd[1]: Finished dracut-pre-udev.service. May 10 00:43:44.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.722000 audit: BPF prog-id=7 op=LOAD May 10 00:43:44.722000 audit: BPF prog-id=8 op=LOAD May 10 00:43:44.724355 systemd[1]: Starting systemd-udevd.service... May 10 00:43:44.741165 systemd-udevd[385]: Using default interface naming scheme 'v252'. May 10 00:43:44.748461 systemd[1]: Started systemd-udevd.service. May 10 00:43:44.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.753589 systemd[1]: Starting dracut-pre-trigger.service... May 10 00:43:44.772346 dracut-pre-trigger[397]: rd.md=0: removing MD RAID activation May 10 00:43:44.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.818276 systemd[1]: Finished dracut-pre-trigger.service. May 10 00:43:44.819935 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:43:44.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:44.876756 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:43:44.949876 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) May 10 00:43:45.030679 kernel: cryptd: max_cpu_qlen set to 1000 May 10 00:43:45.030712 kernel: scsi host0: Virtio SCSI HBA May 10 00:43:45.030874 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 10 00:43:45.030888 kernel: GPT:9289727 != 125829119 May 10 00:43:45.030899 kernel: GPT:Alternate GPT header not at the end of the disk. May 10 00:43:45.030910 kernel: GPT:9289727 != 125829119 May 10 00:43:45.030921 kernel: GPT: Use GNU Parted to correct GPT errors. May 10 00:43:45.030932 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:43:45.030947 kernel: AVX2 version of gcm_enc/dec engaged. May 10 00:43:45.030971 kernel: AES CTR mode by8 optimization enabled May 10 00:43:45.030987 kernel: libata version 3.00 loaded. May 10 00:43:45.033283 kernel: virtio_blk virtio5: [vdb] 980 512-byte logical blocks (502 kB/490 KiB) May 10 00:43:45.039468 kernel: ata_piix 0000:00:01.1: version 2.13 May 10 00:43:45.048600 kernel: scsi host1: ata_piix May 10 00:43:45.048890 kernel: scsi host2: ata_piix May 10 00:43:45.049124 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 May 10 00:43:45.049163 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 May 10 00:43:45.082864 kernel: ACPI: bus type USB registered May 10 00:43:45.083863 kernel: usbcore: registered new interface driver usbfs May 10 00:43:45.083907 kernel: usbcore: registered new interface driver hub May 10 00:43:45.083921 kernel: usbcore: registered new device driver usb May 10 00:43:45.087340 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 00:43:45.133328 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (443) May 10 00:43:45.149126 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 00:43:45.149870 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 00:43:45.156529 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 00:43:45.162624 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:43:45.164603 systemd[1]: Starting disk-uuid.service... May 10 00:43:45.191895 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:43:45.191971 disk-uuid[505]: Primary Header is updated. May 10 00:43:45.191971 disk-uuid[505]: Secondary Entries is updated. May 10 00:43:45.191971 disk-uuid[505]: Secondary Header is updated. May 10 00:43:45.197879 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:43:45.236869 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver May 10 00:43:45.259881 kernel: ehci-pci: EHCI PCI platform driver May 10 00:43:45.289882 kernel: uhci_hcd: USB Universal Host Controller Interface driver May 10 00:43:45.325878 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller May 10 00:43:45.352531 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 May 10 00:43:45.352672 kernel: uhci_hcd 0000:00:01.2: detected 2 ports May 10 00:43:45.352782 kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c180 May 10 00:43:45.352946 kernel: hub 1-0:1.0: USB hub found May 10 00:43:45.353154 kernel: hub 1-0:1.0: 2 ports detected May 10 00:43:46.212936 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:43:46.213423 disk-uuid[506]: The operation has completed successfully. May 10 00:43:46.275321 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 00:43:46.275504 systemd[1]: Finished disk-uuid.service. May 10 00:43:46.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:46.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:46.283695 systemd[1]: Starting verity-setup.service... May 10 00:43:46.311212 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 10 00:43:46.390890 systemd[1]: Found device dev-mapper-usr.device. May 10 00:43:46.393477 systemd[1]: Mounting sysusr-usr.mount... May 10 00:43:46.395047 systemd[1]: Finished verity-setup.service. May 10 00:43:46.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:46.494917 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 00:43:46.495616 systemd[1]: Mounted sysusr-usr.mount. May 10 00:43:46.496529 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 10 00:43:46.498233 systemd[1]: Starting ignition-setup.service... May 10 00:43:46.499919 systemd[1]: Starting parse-ip-for-networkd.service... May 10 00:43:46.525224 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:43:46.525322 kernel: BTRFS info (device vda6): using free space tree May 10 00:43:46.525345 kernel: BTRFS info (device vda6): has skinny extents May 10 00:43:46.552793 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 00:43:46.561213 systemd[1]: Finished ignition-setup.service. May 10 00:43:46.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:46.562753 systemd[1]: Starting ignition-fetch-offline.service... May 10 00:43:46.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:46.678992 systemd[1]: Finished parse-ip-for-networkd.service. May 10 00:43:46.681000 audit: BPF prog-id=9 op=LOAD May 10 00:43:46.684343 systemd[1]: Starting systemd-networkd.service... May 10 00:43:46.724820 systemd-networkd[689]: lo: Link UP May 10 00:43:46.725734 systemd-networkd[689]: lo: Gained carrier May 10 00:43:46.728068 systemd-networkd[689]: Enumeration completed May 10 00:43:46.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:46.729229 systemd[1]: Started systemd-networkd.service. May 10 00:43:46.730194 systemd[1]: Reached target network.target. May 10 00:43:46.732451 systemd[1]: Starting iscsiuio.service... May 10 00:43:46.736636 systemd-networkd[689]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:43:46.739579 systemd-networkd[689]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. May 10 00:43:46.743045 systemd-networkd[689]: eth1: Link UP May 10 00:43:46.744099 systemd-networkd[689]: eth1: Gained carrier May 10 00:43:46.755160 systemd-networkd[689]: eth0: Link UP May 10 00:43:46.755799 systemd-networkd[689]: eth0: Gained carrier May 10 00:43:46.757670 systemd[1]: Started iscsiuio.service. May 10 00:43:46.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:46.759689 systemd[1]: Starting iscsid.service... May 10 00:43:46.770995 iscsid[694]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 00:43:46.770995 iscsid[694]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 00:43:46.770995 iscsid[694]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 00:43:46.770995 iscsid[694]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 00:43:46.770995 iscsid[694]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 00:43:46.770995 iscsid[694]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 00:43:46.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:46.779044 systemd[1]: Started iscsid.service. May 10 00:43:46.787378 systemd[1]: Starting dracut-initqueue.service... May 10 00:43:46.791147 systemd-networkd[689]: eth0: DHCPv4 address 143.198.48.176/20, gateway 143.198.48.1 acquired from 169.254.169.253 May 10 00:43:46.805074 systemd-networkd[689]: eth1: DHCPv4 address 10.124.0.35/20 acquired from 169.254.169.253 May 10 00:43:46.813938 systemd[1]: Finished dracut-initqueue.service. May 10 00:43:46.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:46.814776 systemd[1]: Reached target remote-fs-pre.target. May 10 00:43:46.815359 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:43:46.816174 systemd[1]: Reached target remote-fs.target. May 10 00:43:46.819555 systemd[1]: Starting dracut-pre-mount.service... May 10 00:43:46.827515 ignition[615]: Ignition 2.14.0 May 10 00:43:46.827544 ignition[615]: Stage: fetch-offline May 10 00:43:46.827673 ignition[615]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:43:46.827714 ignition[615]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 10 00:43:46.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:46.838932 systemd[1]: Finished dracut-pre-mount.service. May 10 00:43:46.838941 ignition[615]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 10 00:43:46.841302 systemd[1]: Finished ignition-fetch-offline.service. May 10 00:43:46.839579 ignition[615]: parsed url from cmdline: "" May 10 00:43:46.839585 ignition[615]: no config URL provided May 10 00:43:46.839592 ignition[615]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:43:46.839605 ignition[615]: no config at "/usr/lib/ignition/user.ign" May 10 00:43:46.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:46.839612 ignition[615]: failed to fetch config: resource requires networking May 10 00:43:46.843763 systemd[1]: Starting ignition-fetch.service... May 10 00:43:46.840156 ignition[615]: Ignition finished successfully May 10 00:43:46.862858 ignition[708]: Ignition 2.14.0 May 10 00:43:46.863804 ignition[708]: Stage: fetch May 10 00:43:46.864655 ignition[708]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:43:46.865463 ignition[708]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 10 00:43:46.870729 ignition[708]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 10 00:43:46.871760 ignition[708]: parsed url from cmdline: "" May 10 00:43:46.871908 ignition[708]: no config URL provided May 10 00:43:46.872430 ignition[708]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:43:46.873001 ignition[708]: no config at "/usr/lib/ignition/user.ign" May 10 00:43:46.873541 ignition[708]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 May 10 00:43:46.892141 ignition[708]: GET result: OK May 10 00:43:46.893062 ignition[708]: parsing config with SHA512: 696b60a9b0fb3a84bc0f2f147f8bafc9d74b3b1b162d71d620985618c8f48dfeb4a75faa2f20dbd14d898caaa6f54a7c56c861349b74747bc60adb6de65c3586 May 10 00:43:46.901839 unknown[708]: fetched base config from "system" May 10 00:43:46.901882 unknown[708]: fetched base config from "system" May 10 00:43:46.902587 ignition[708]: fetch: fetch complete May 10 00:43:46.901892 unknown[708]: fetched user config from "digitalocean" May 10 00:43:46.902593 ignition[708]: fetch: fetch passed May 10 00:43:46.905007 systemd[1]: Finished ignition-fetch.service. May 10 00:43:46.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:46.902653 ignition[708]: Ignition finished successfully May 10 00:43:46.907835 systemd[1]: Starting ignition-kargs.service... May 10 00:43:46.926998 ignition[714]: Ignition 2.14.0 May 10 00:43:46.927988 ignition[714]: Stage: kargs May 10 00:43:46.928775 ignition[714]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:43:46.929557 ignition[714]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 10 00:43:46.933767 ignition[714]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 10 00:43:46.937377 ignition[714]: kargs: kargs passed May 10 00:43:46.938544 ignition[714]: Ignition finished successfully May 10 00:43:46.940030 systemd[1]: Finished ignition-kargs.service. May 10 00:43:46.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:46.942287 systemd[1]: Starting ignition-disks.service... May 10 00:43:46.954070 ignition[720]: Ignition 2.14.0 May 10 00:43:46.954817 ignition[720]: Stage: disks May 10 00:43:46.955506 ignition[720]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:43:46.956205 ignition[720]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 10 00:43:46.958718 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 10 00:43:46.961921 ignition[720]: disks: disks passed May 10 00:43:46.963637 ignition[720]: Ignition finished successfully May 10 00:43:46.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:46.964974 systemd[1]: Finished ignition-disks.service. May 10 00:43:46.965503 systemd[1]: Reached target initrd-root-device.target. May 10 00:43:46.966238 systemd[1]: Reached target local-fs-pre.target. May 10 00:43:46.966917 systemd[1]: Reached target local-fs.target. May 10 00:43:46.967541 systemd[1]: Reached target sysinit.target. May 10 00:43:46.968156 systemd[1]: Reached target basic.target. May 10 00:43:46.970091 systemd[1]: Starting systemd-fsck-root.service... May 10 00:43:46.991397 systemd-fsck[728]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 10 00:43:46.995276 systemd[1]: Finished systemd-fsck-root.service. May 10 00:43:46.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:46.996818 systemd[1]: Mounting sysroot.mount... May 10 00:43:47.012885 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 00:43:47.013522 systemd[1]: Mounted sysroot.mount. May 10 00:43:47.014281 systemd[1]: Reached target initrd-root-fs.target. May 10 00:43:47.016494 systemd[1]: Mounting sysroot-usr.mount... May 10 00:43:47.017949 systemd[1]: Starting flatcar-digitalocean-network.service... May 10 00:43:47.026440 systemd[1]: Starting flatcar-metadata-hostname.service... May 10 00:43:47.028326 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 00:43:47.028382 systemd[1]: Reached target ignition-diskful.target. May 10 00:43:47.031639 systemd[1]: Mounted sysroot-usr.mount. May 10 00:43:47.048917 systemd[1]: Starting initrd-setup-root.service... May 10 00:43:47.056149 initrd-setup-root[740]: cut: /sysroot/etc/passwd: No such file or directory May 10 00:43:47.069141 initrd-setup-root[748]: cut: /sysroot/etc/group: No such file or directory May 10 00:43:47.090726 initrd-setup-root[760]: cut: /sysroot/etc/shadow: No such file or directory May 10 00:43:47.104365 initrd-setup-root[768]: cut: /sysroot/etc/gshadow: No such file or directory May 10 00:43:47.195761 coreos-metadata[734]: May 10 00:43:47.195 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 10 00:43:47.217366 coreos-metadata[734]: May 10 00:43:47.217 INFO Fetch successful May 10 00:43:47.226243 systemd[1]: Finished initrd-setup-root.service. May 10 00:43:47.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:47.228513 systemd[1]: Starting ignition-mount.service... May 10 00:43:47.230637 systemd[1]: Starting sysroot-boot.service... May 10 00:43:47.241335 coreos-metadata[735]: May 10 00:43:47.240 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 10 00:43:47.241465 systemd[1]: flatcar-digitalocean-network.service: Deactivated successfully. May 10 00:43:47.241659 systemd[1]: Finished flatcar-digitalocean-network.service. May 10 00:43:47.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:47.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:47.255568 bash[785]: umount: /sysroot/usr/share/oem: not mounted. May 10 00:43:47.260883 coreos-metadata[735]: May 10 00:43:47.260 INFO Fetch successful May 10 00:43:47.263290 coreos-metadata[735]: May 10 00:43:47.263 INFO wrote hostname ci-3510.3.7-n-3080830dac to /sysroot/etc/hostname May 10 00:43:47.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:47.265394 systemd[1]: Finished flatcar-metadata-hostname.service. May 10 00:43:47.281210 ignition[787]: INFO : Ignition 2.14.0 May 10 00:43:47.281210 ignition[787]: INFO : Stage: mount May 10 00:43:47.282828 ignition[787]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:43:47.282828 ignition[787]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 10 00:43:47.285155 ignition[787]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 10 00:43:47.290130 ignition[787]: INFO : mount: mount passed May 10 00:43:47.290130 ignition[787]: INFO : Ignition finished successfully May 10 00:43:47.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:47.288762 systemd[1]: Finished ignition-mount.service. May 10 00:43:47.294235 systemd[1]: Finished sysroot-boot.service. May 10 00:43:47.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:47.416239 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:43:47.426944 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (794) May 10 00:43:47.436362 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:43:47.436455 kernel: BTRFS info (device vda6): using free space tree May 10 00:43:47.436469 kernel: BTRFS info (device vda6): has skinny extents May 10 00:43:47.442136 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:43:47.444098 systemd[1]: Starting ignition-files.service... May 10 00:43:47.471213 ignition[814]: INFO : Ignition 2.14.0 May 10 00:43:47.471213 ignition[814]: INFO : Stage: files May 10 00:43:47.472769 ignition[814]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:43:47.472769 ignition[814]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 10 00:43:47.474731 ignition[814]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 10 00:43:47.478854 ignition[814]: DEBUG : files: compiled without relabeling support, skipping May 10 00:43:47.479808 ignition[814]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 00:43:47.479808 ignition[814]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 00:43:47.483168 ignition[814]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 00:43:47.484339 ignition[814]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 00:43:47.485321 ignition[814]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 00:43:47.485133 unknown[814]: wrote ssh authorized keys file for user: core May 10 00:43:47.487588 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 00:43:47.487588 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 10 00:43:47.540977 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 10 00:43:47.654061 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 00:43:47.654927 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 10 00:43:47.654927 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 10 00:43:47.654927 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 10 00:43:47.654927 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 10 00:43:47.654927 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:43:47.657813 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:43:47.657813 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:43:47.657813 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:43:47.657813 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:43:47.657813 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:43:47.657813 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:43:47.657813 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:43:47.657813 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:43:47.657813 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 May 10 00:43:47.917576 systemd-networkd[689]: eth0: Gained IPv6LL May 10 00:43:47.918271 systemd-networkd[689]: eth1: Gained IPv6LL May 10 00:43:48.099394 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 10 00:43:48.470566 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:43:48.470566 ignition[814]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" May 10 00:43:48.470566 ignition[814]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" May 10 00:43:48.470566 ignition[814]: INFO : files: op(c): [started] processing unit "prepare-helm.service" May 10 00:43:48.478759 ignition[814]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:43:48.478759 ignition[814]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:43:48.478759 ignition[814]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" May 10 00:43:48.478759 ignition[814]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 00:43:48.478759 ignition[814]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 00:43:48.478759 ignition[814]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 10 00:43:48.478759 ignition[814]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 10 00:43:48.497021 kernel: kauditd_printk_skb: 28 callbacks suppressed May 10 00:43:48.497058 kernel: audit: type=1130 audit(1746837828.486:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.484036 systemd[1]: Finished ignition-files.service. May 10 00:43:48.498058 ignition[814]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 00:43:48.498058 ignition[814]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 00:43:48.498058 ignition[814]: INFO : files: files passed May 10 00:43:48.498058 ignition[814]: INFO : Ignition finished successfully May 10 00:43:48.507927 kernel: audit: type=1130 audit(1746837828.499:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.507970 kernel: audit: type=1131 audit(1746837828.499:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.489359 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 00:43:48.491465 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 00:43:48.492622 systemd[1]: Starting ignition-quench.service... May 10 00:43:48.515894 kernel: audit: type=1130 audit(1746837828.511:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.516008 initrd-setup-root-after-ignition[839]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 00:43:48.498490 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 00:43:48.498665 systemd[1]: Finished ignition-quench.service. May 10 00:43:48.511284 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 00:43:48.512217 systemd[1]: Reached target ignition-complete.target. May 10 00:43:48.517566 systemd[1]: Starting initrd-parse-etc.service... May 10 00:43:48.543481 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 00:43:48.543661 systemd[1]: Finished initrd-parse-etc.service. May 10 00:43:48.551431 kernel: audit: type=1130 audit(1746837828.543:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.551478 kernel: audit: type=1131 audit(1746837828.543:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.544911 systemd[1]: Reached target initrd-fs.target. May 10 00:43:48.551714 systemd[1]: Reached target initrd.target. May 10 00:43:48.552619 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 00:43:48.553779 systemd[1]: Starting dracut-pre-pivot.service... May 10 00:43:48.578120 systemd[1]: Finished dracut-pre-pivot.service. May 10 00:43:48.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.580396 systemd[1]: Starting initrd-cleanup.service... May 10 00:43:48.584699 kernel: audit: type=1130 audit(1746837828.578:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.596662 systemd[1]: Stopped target nss-lookup.target. May 10 00:43:48.597911 systemd[1]: Stopped target remote-cryptsetup.target. May 10 00:43:48.599187 systemd[1]: Stopped target timers.target. May 10 00:43:48.600165 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 00:43:48.600828 systemd[1]: Stopped dracut-pre-pivot.service. May 10 00:43:48.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.602454 systemd[1]: Stopped target initrd.target. May 10 00:43:48.605486 kernel: audit: type=1131 audit(1746837828.600:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.604594 systemd[1]: Stopped target basic.target. May 10 00:43:48.605031 systemd[1]: Stopped target ignition-complete.target. May 10 00:43:48.606186 systemd[1]: Stopped target ignition-diskful.target. May 10 00:43:48.615202 systemd[1]: Stopped target initrd-root-device.target. May 10 00:43:48.615981 systemd[1]: Stopped target remote-fs.target. May 10 00:43:48.617036 systemd[1]: Stopped target remote-fs-pre.target. May 10 00:43:48.618164 systemd[1]: Stopped target sysinit.target. May 10 00:43:48.618902 systemd[1]: Stopped target local-fs.target. May 10 00:43:48.619808 systemd[1]: Stopped target local-fs-pre.target. May 10 00:43:48.621275 systemd[1]: Stopped target swap.target. May 10 00:43:48.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.622217 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 00:43:48.630470 kernel: audit: type=1131 audit(1746837828.622:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.622526 systemd[1]: Stopped dracut-pre-mount.service. May 10 00:43:48.623414 systemd[1]: Stopped target cryptsetup.target. May 10 00:43:48.631032 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 00:43:48.636783 kernel: audit: type=1131 audit(1746837828.631:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.631243 systemd[1]: Stopped dracut-initqueue.service. May 10 00:43:48.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.632192 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 00:43:48.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.632387 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 00:43:48.636380 systemd[1]: ignition-files.service: Deactivated successfully. May 10 00:43:48.636584 systemd[1]: Stopped ignition-files.service. May 10 00:43:48.652802 iscsid[694]: iscsid shutting down. May 10 00:43:48.637314 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. May 10 00:43:48.637491 systemd[1]: Stopped flatcar-metadata-hostname.service. May 10 00:43:48.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.640027 systemd[1]: Stopping ignition-mount.service... May 10 00:43:48.640877 systemd[1]: Stopping iscsid.service... May 10 00:43:48.652055 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 00:43:48.652315 systemd[1]: Stopped kmod-static-nodes.service. May 10 00:43:48.654763 systemd[1]: Stopping sysroot-boot.service... May 10 00:43:48.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.658571 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 00:43:48.658896 systemd[1]: Stopped systemd-udev-trigger.service. May 10 00:43:48.659682 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 00:43:48.659854 systemd[1]: Stopped dracut-pre-trigger.service. May 10 00:43:48.663046 systemd[1]: iscsid.service: Deactivated successfully. May 10 00:43:48.663808 systemd[1]: Stopped iscsid.service. May 10 00:43:48.671273 ignition[852]: INFO : Ignition 2.14.0 May 10 00:43:48.671273 ignition[852]: INFO : Stage: umount May 10 00:43:48.672573 ignition[852]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:43:48.672573 ignition[852]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 10 00:43:48.676910 ignition[852]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 10 00:43:48.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.678456 systemd[1]: Stopping iscsiuio.service... May 10 00:43:48.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.681169 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 00:43:48.681311 systemd[1]: Finished initrd-cleanup.service. May 10 00:43:48.685277 systemd[1]: iscsiuio.service: Deactivated successfully. May 10 00:43:48.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.685425 systemd[1]: Stopped iscsiuio.service. May 10 00:43:48.687770 ignition[852]: INFO : umount: umount passed May 10 00:43:48.689310 ignition[852]: INFO : Ignition finished successfully May 10 00:43:48.691388 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 00:43:48.691546 systemd[1]: Stopped ignition-mount.service. May 10 00:43:48.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.692988 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 00:43:48.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.693082 systemd[1]: Stopped ignition-disks.service. May 10 00:43:48.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.696007 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 00:43:48.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.696090 systemd[1]: Stopped ignition-kargs.service. May 10 00:43:48.697818 systemd[1]: ignition-fetch.service: Deactivated successfully. May 10 00:43:48.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.697892 systemd[1]: Stopped ignition-fetch.service. May 10 00:43:48.698639 systemd[1]: Stopped target network.target. May 10 00:43:48.699273 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 00:43:48.699337 systemd[1]: Stopped ignition-fetch-offline.service. May 10 00:43:48.700063 systemd[1]: Stopped target paths.target. May 10 00:43:48.701120 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 00:43:48.702961 systemd[1]: Stopped systemd-ask-password-console.path. May 10 00:43:48.703583 systemd[1]: Stopped target slices.target. May 10 00:43:48.704403 systemd[1]: Stopped target sockets.target. May 10 00:43:48.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.705333 systemd[1]: iscsid.socket: Deactivated successfully. May 10 00:43:48.705407 systemd[1]: Closed iscsid.socket. May 10 00:43:48.706578 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 00:43:48.706652 systemd[1]: Closed iscsiuio.socket. May 10 00:43:48.707348 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 00:43:48.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.707421 systemd[1]: Stopped ignition-setup.service. May 10 00:43:48.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.709182 systemd[1]: Stopping systemd-networkd.service... May 10 00:43:48.710468 systemd[1]: Stopping systemd-resolved.service... May 10 00:43:48.712266 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 10 00:43:48.712905 systemd-networkd[689]: eth0: DHCPv6 lease lost May 10 00:43:48.713368 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 00:43:48.713507 systemd[1]: Stopped sysroot-boot.service. May 10 00:43:48.714642 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 00:43:48.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.714695 systemd[1]: Stopped initrd-setup-root.service. May 10 00:43:48.716001 systemd-networkd[689]: eth1: DHCPv6 lease lost May 10 00:43:48.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.719193 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 00:43:48.722000 audit: BPF prog-id=6 op=UNLOAD May 10 00:43:48.719376 systemd[1]: Stopped systemd-resolved.service. May 10 00:43:48.721458 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:43:48.721637 systemd[1]: Stopped systemd-networkd.service. May 10 00:43:48.723199 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 00:43:48.726000 audit: BPF prog-id=9 op=UNLOAD May 10 00:43:48.723267 systemd[1]: Closed systemd-networkd.socket. May 10 00:43:48.725138 systemd[1]: Stopping network-cleanup.service... May 10 00:43:48.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.727850 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 00:43:48.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.727978 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 00:43:48.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.728902 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 00:43:48.729030 systemd[1]: Stopped systemd-sysctl.service. May 10 00:43:48.730087 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 00:43:48.730163 systemd[1]: Stopped systemd-modules-load.service. May 10 00:43:48.737593 systemd[1]: Stopping systemd-udevd.service... May 10 00:43:48.741587 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 10 00:43:48.743928 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 00:43:48.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.744265 systemd[1]: Stopped systemd-udevd.service. May 10 00:43:48.745715 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 00:43:48.745796 systemd[1]: Closed systemd-udevd-control.socket. May 10 00:43:48.750620 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 00:43:48.750687 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 00:43:48.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.751458 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 00:43:48.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.751534 systemd[1]: Stopped dracut-pre-udev.service. May 10 00:43:48.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.752456 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 00:43:48.752529 systemd[1]: Stopped dracut-cmdline.service. May 10 00:43:48.753281 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 00:43:48.753342 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 00:43:48.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.755473 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 00:43:48.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.756253 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 00:43:48.756351 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 00:43:48.767025 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 00:43:48.767194 systemd[1]: Stopped network-cleanup.service. May 10 00:43:48.771474 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 00:43:48.771651 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 00:43:48.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:48.773500 systemd[1]: Reached target initrd-switch-root.target. May 10 00:43:48.775324 systemd[1]: Starting initrd-switch-root.service... May 10 00:43:48.790257 systemd[1]: Switching root. May 10 00:43:48.814326 systemd-journald[183]: Journal stopped May 10 00:43:52.884240 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). May 10 00:43:52.884336 kernel: SELinux: Class mctp_socket not defined in policy. May 10 00:43:52.884388 kernel: SELinux: Class anon_inode not defined in policy. May 10 00:43:52.884412 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 00:43:52.884431 kernel: SELinux: policy capability network_peer_controls=1 May 10 00:43:52.884454 kernel: SELinux: policy capability open_perms=1 May 10 00:43:52.884474 kernel: SELinux: policy capability extended_socket_class=1 May 10 00:43:52.884497 kernel: SELinux: policy capability always_check_network=0 May 10 00:43:52.884520 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 00:43:52.884539 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 00:43:52.884556 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 00:43:52.884572 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 00:43:52.884596 systemd[1]: Successfully loaded SELinux policy in 50.296ms. May 10 00:43:52.884630 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.481ms. May 10 00:43:52.884659 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:43:52.884684 systemd[1]: Detected virtualization kvm. May 10 00:43:52.884705 systemd[1]: Detected architecture x86-64. May 10 00:43:52.884725 systemd[1]: Detected first boot. May 10 00:43:52.884743 systemd[1]: Hostname set to . May 10 00:43:52.884759 systemd[1]: Initializing machine ID from VM UUID. May 10 00:43:52.884777 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 00:43:52.884796 systemd[1]: Populated /etc with preset unit settings. May 10 00:43:52.884814 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:43:52.885831 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:43:52.885925 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:43:52.885971 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 10 00:43:52.885995 systemd[1]: Stopped initrd-switch-root.service. May 10 00:43:52.886015 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 10 00:43:52.886036 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 00:43:52.886058 systemd[1]: Created slice system-addon\x2drun.slice. May 10 00:43:52.886080 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 10 00:43:52.886110 systemd[1]: Created slice system-getty.slice. May 10 00:43:52.886131 systemd[1]: Created slice system-modprobe.slice. May 10 00:43:52.886153 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 00:43:52.886173 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 00:43:52.886193 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 00:43:52.886213 systemd[1]: Created slice user.slice. May 10 00:43:52.886233 systemd[1]: Started systemd-ask-password-console.path. May 10 00:43:52.886255 systemd[1]: Started systemd-ask-password-wall.path. May 10 00:43:52.886276 systemd[1]: Set up automount boot.automount. May 10 00:43:52.886301 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 00:43:52.886322 systemd[1]: Stopped target initrd-switch-root.target. May 10 00:43:52.886345 systemd[1]: Stopped target initrd-fs.target. May 10 00:43:52.886367 systemd[1]: Stopped target initrd-root-fs.target. May 10 00:43:52.886391 systemd[1]: Reached target integritysetup.target. May 10 00:43:52.886413 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:43:52.886460 systemd[1]: Reached target remote-fs.target. May 10 00:43:52.886482 systemd[1]: Reached target slices.target. May 10 00:43:52.886504 systemd[1]: Reached target swap.target. May 10 00:43:52.886525 systemd[1]: Reached target torcx.target. May 10 00:43:52.886547 systemd[1]: Reached target veritysetup.target. May 10 00:43:52.886569 systemd[1]: Listening on systemd-coredump.socket. May 10 00:43:52.886589 systemd[1]: Listening on systemd-initctl.socket. May 10 00:43:52.886610 systemd[1]: Listening on systemd-networkd.socket. May 10 00:43:52.886632 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:43:52.886658 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:43:52.886678 systemd[1]: Listening on systemd-userdbd.socket. May 10 00:43:52.886698 systemd[1]: Mounting dev-hugepages.mount... May 10 00:43:52.886721 systemd[1]: Mounting dev-mqueue.mount... May 10 00:43:52.886742 systemd[1]: Mounting media.mount... May 10 00:43:52.886763 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:43:52.886781 systemd[1]: Mounting sys-kernel-debug.mount... May 10 00:43:52.886803 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 00:43:52.886826 systemd[1]: Mounting tmp.mount... May 10 00:43:52.887916 systemd[1]: Starting flatcar-tmpfiles.service... May 10 00:43:52.887957 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:43:52.887978 systemd[1]: Starting kmod-static-nodes.service... May 10 00:43:52.887998 systemd[1]: Starting modprobe@configfs.service... May 10 00:43:52.888018 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:43:52.888039 systemd[1]: Starting modprobe@drm.service... May 10 00:43:52.888058 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:43:52.888078 systemd[1]: Starting modprobe@fuse.service... May 10 00:43:52.888101 systemd[1]: Starting modprobe@loop.service... May 10 00:43:52.888124 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:43:52.888150 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 10 00:43:52.888169 systemd[1]: Stopped systemd-fsck-root.service. May 10 00:43:52.888188 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 10 00:43:52.888205 systemd[1]: Stopped systemd-fsck-usr.service. May 10 00:43:52.888225 systemd[1]: Stopped systemd-journald.service. May 10 00:43:52.888242 systemd[1]: Starting systemd-journald.service... May 10 00:43:52.888263 systemd[1]: Starting systemd-modules-load.service... May 10 00:43:52.888285 systemd[1]: Starting systemd-network-generator.service... May 10 00:43:52.888309 systemd[1]: Starting systemd-remount-fs.service... May 10 00:43:52.888330 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:43:52.888352 systemd[1]: verity-setup.service: Deactivated successfully. May 10 00:43:52.888374 systemd[1]: Stopped verity-setup.service. May 10 00:43:52.888396 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:43:52.888415 systemd[1]: Mounted dev-hugepages.mount. May 10 00:43:52.888434 systemd[1]: Mounted dev-mqueue.mount. May 10 00:43:52.888456 systemd[1]: Mounted media.mount. May 10 00:43:52.888478 systemd[1]: Mounted sys-kernel-debug.mount. May 10 00:43:52.888500 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 00:43:52.888529 systemd[1]: Mounted tmp.mount. May 10 00:43:52.888550 systemd[1]: Finished kmod-static-nodes.service. May 10 00:43:52.888569 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 00:43:52.888589 systemd[1]: Finished modprobe@configfs.service. May 10 00:43:52.888645 kernel: loop: module loaded May 10 00:43:52.888679 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:43:52.888707 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:43:52.888729 kernel: fuse: init (API version 7.34) May 10 00:43:52.888749 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:43:52.888771 systemd[1]: Finished modprobe@drm.service. May 10 00:43:52.890547 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:43:52.890593 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:43:52.890613 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 00:43:52.890643 systemd[1]: Finished modprobe@fuse.service. May 10 00:43:52.890666 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:43:52.890689 systemd[1]: Finished modprobe@loop.service. May 10 00:43:52.890725 systemd-journald[955]: Journal started May 10 00:43:52.890822 systemd-journald[955]: Runtime Journal (/run/log/journal/cb54abce6b934139b86a74e274bc3a29) is 4.9M, max 39.5M, 34.5M free. May 10 00:43:49.005000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 00:43:49.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:43:49.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:43:49.070000 audit: BPF prog-id=10 op=LOAD May 10 00:43:49.070000 audit: BPF prog-id=10 op=UNLOAD May 10 00:43:49.070000 audit: BPF prog-id=11 op=LOAD May 10 00:43:49.070000 audit: BPF prog-id=11 op=UNLOAD May 10 00:43:49.192000 audit[885]: AVC avc: denied { associate } for pid=885 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:43:49.192000 audit[885]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d892 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=868 pid=885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:49.192000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:43:49.194000 audit[885]: AVC avc: denied { associate } for pid=885 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 10 00:43:49.194000 audit[885]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d969 a2=1ed a3=0 items=2 ppid=868 pid=885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:49.194000 audit: CWD cwd="/" May 10 00:43:49.194000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:49.194000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:49.194000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:43:52.895167 systemd[1]: Finished systemd-modules-load.service. May 10 00:43:52.895249 systemd[1]: Started systemd-journald.service. May 10 00:43:52.634000 audit: BPF prog-id=12 op=LOAD May 10 00:43:52.635000 audit: BPF prog-id=3 op=UNLOAD May 10 00:43:52.635000 audit: BPF prog-id=13 op=LOAD May 10 00:43:52.635000 audit: BPF prog-id=14 op=LOAD May 10 00:43:52.635000 audit: BPF prog-id=4 op=UNLOAD May 10 00:43:52.635000 audit: BPF prog-id=5 op=UNLOAD May 10 00:43:52.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.645000 audit: BPF prog-id=12 op=UNLOAD May 10 00:43:52.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.783000 audit: BPF prog-id=15 op=LOAD May 10 00:43:52.783000 audit: BPF prog-id=16 op=LOAD May 10 00:43:52.783000 audit: BPF prog-id=17 op=LOAD May 10 00:43:52.784000 audit: BPF prog-id=13 op=UNLOAD May 10 00:43:52.784000 audit: BPF prog-id=14 op=UNLOAD May 10 00:43:52.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.881000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 00:43:52.881000 audit[955]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffcfbbeb010 a2=4000 a3=7ffcfbbeb0ac items=0 ppid=1 pid=955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:52.881000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 00:43:52.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:49.188423 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:43:52.632119 systemd[1]: Queued start job for default target multi-user.target. May 10 00:43:49.189344 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:49Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:43:52.632140 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 10 00:43:49.189391 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:49Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:43:52.637157 systemd[1]: systemd-journald.service: Deactivated successfully. May 10 00:43:49.189451 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:49Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 10 00:43:52.897441 systemd[1]: Finished systemd-network-generator.service. May 10 00:43:49.189468 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:49Z" level=debug msg="skipped missing lower profile" missing profile=oem May 10 00:43:52.898592 systemd[1]: Finished systemd-remount-fs.service. May 10 00:43:49.189534 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:49Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 10 00:43:52.899624 systemd[1]: Reached target network-pre.target. May 10 00:43:49.189559 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:49Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 10 00:43:52.904147 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 00:43:49.189939 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:49Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 10 00:43:52.909130 systemd[1]: Mounting sys-kernel-config.mount... May 10 00:43:49.190107 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:49Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:43:52.910256 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:43:49.190129 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:49Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:43:49.191996 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:49Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 10 00:43:49.192066 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:49Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 10 00:43:49.192098 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:49Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 10 00:43:49.192120 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:49Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 10 00:43:49.192150 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:49Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 10 00:43:49.192171 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:49Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 10 00:43:52.093737 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:52Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:43:52.094270 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:52Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:43:52.094509 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:52Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:43:52.095093 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:52Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:43:52.095206 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:52Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 10 00:43:52.095372 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-05-10T00:43:52Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 10 00:43:52.918229 systemd[1]: Starting systemd-hwdb-update.service... May 10 00:43:52.921819 systemd[1]: Starting systemd-journal-flush.service... May 10 00:43:52.922493 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:43:52.926470 systemd[1]: Starting systemd-random-seed.service... May 10 00:43:52.927140 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:43:52.929315 systemd[1]: Starting systemd-sysctl.service... May 10 00:43:52.936730 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 00:43:52.938789 systemd[1]: Mounted sys-kernel-config.mount. May 10 00:43:52.952458 systemd-journald[955]: Time spent on flushing to /var/log/journal/cb54abce6b934139b86a74e274bc3a29 is 50.344ms for 1138 entries. May 10 00:43:52.952458 systemd-journald[955]: System Journal (/var/log/journal/cb54abce6b934139b86a74e274bc3a29) is 8.0M, max 195.6M, 187.6M free. May 10 00:43:53.010013 systemd-journald[955]: Received client request to flush runtime journal. May 10 00:43:52.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.973168 systemd[1]: Finished systemd-random-seed.service. May 10 00:43:53.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.974107 systemd[1]: Reached target first-boot-complete.target. May 10 00:43:52.992296 systemd[1]: Finished systemd-sysctl.service. May 10 00:43:53.011360 systemd[1]: Finished systemd-journal-flush.service. May 10 00:43:53.013735 systemd[1]: Finished flatcar-tmpfiles.service. May 10 00:43:53.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:53.016586 systemd[1]: Starting systemd-sysusers.service... May 10 00:43:53.061403 systemd[1]: Finished systemd-sysusers.service. May 10 00:43:53.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:53.072785 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:43:53.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:53.075251 systemd[1]: Starting systemd-udev-settle.service... May 10 00:43:53.090397 udevadm[995]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 10 00:43:53.814947 systemd[1]: Finished systemd-hwdb-update.service. May 10 00:43:53.822015 kernel: kauditd_printk_skb: 95 callbacks suppressed May 10 00:43:53.822131 kernel: audit: type=1130 audit(1746837833.814:135): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:53.822162 kernel: audit: type=1334 audit(1746837833.818:136): prog-id=18 op=LOAD May 10 00:43:53.822190 kernel: audit: type=1334 audit(1746837833.819:137): prog-id=19 op=LOAD May 10 00:43:53.822216 kernel: audit: type=1334 audit(1746837833.819:138): prog-id=7 op=UNLOAD May 10 00:43:53.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:53.818000 audit: BPF prog-id=18 op=LOAD May 10 00:43:53.819000 audit: BPF prog-id=19 op=LOAD May 10 00:43:53.819000 audit: BPF prog-id=7 op=UNLOAD May 10 00:43:53.820811 systemd[1]: Starting systemd-udevd.service... May 10 00:43:53.819000 audit: BPF prog-id=8 op=UNLOAD May 10 00:43:53.822903 kernel: audit: type=1334 audit(1746837833.819:139): prog-id=8 op=UNLOAD May 10 00:43:53.843779 systemd-udevd[996]: Using default interface naming scheme 'v252'. May 10 00:43:53.893911 kernel: audit: type=1130 audit(1746837833.883:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:53.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:53.884259 systemd[1]: Started systemd-udevd.service. May 10 00:43:53.887513 systemd[1]: Starting systemd-networkd.service... May 10 00:43:53.885000 audit: BPF prog-id=20 op=LOAD May 10 00:43:53.896870 kernel: audit: type=1334 audit(1746837833.885:141): prog-id=20 op=LOAD May 10 00:43:53.910802 kernel: audit: type=1334 audit(1746837833.903:142): prog-id=21 op=LOAD May 10 00:43:53.911133 kernel: audit: type=1334 audit(1746837833.903:143): prog-id=22 op=LOAD May 10 00:43:53.911196 kernel: audit: type=1334 audit(1746837833.903:144): prog-id=23 op=LOAD May 10 00:43:53.903000 audit: BPF prog-id=21 op=LOAD May 10 00:43:53.903000 audit: BPF prog-id=22 op=LOAD May 10 00:43:53.903000 audit: BPF prog-id=23 op=LOAD May 10 00:43:53.909031 systemd[1]: Starting systemd-userdbd.service... May 10 00:43:53.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:53.966288 systemd[1]: Started systemd-userdbd.service. May 10 00:43:54.006662 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:43:54.006976 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:43:54.008628 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:43:54.011251 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:43:54.015253 systemd[1]: Starting modprobe@loop.service... May 10 00:43:54.015908 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:43:54.016025 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:43:54.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.016153 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:43:54.016715 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:43:54.017196 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:43:54.018431 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:43:54.018975 systemd[1]: Finished modprobe@loop.service. May 10 00:43:54.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.020811 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:43:54.020997 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:43:54.021608 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:43:54.021654 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:43:54.052703 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 10 00:43:54.105513 systemd-networkd[1002]: lo: Link UP May 10 00:43:54.105528 systemd-networkd[1002]: lo: Gained carrier May 10 00:43:54.106985 systemd-networkd[1002]: Enumeration completed May 10 00:43:54.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.107123 systemd-networkd[1002]: eth1: Configuring with /run/systemd/network/10-c2:fd:e8:5a:b9:3b.network. May 10 00:43:54.107139 systemd[1]: Started systemd-networkd.service. May 10 00:43:54.112823 systemd-networkd[1002]: eth0: Configuring with /run/systemd/network/10-26:77:3a:c6:5c:63.network. May 10 00:43:54.113920 systemd-networkd[1002]: eth1: Link UP May 10 00:43:54.113950 systemd-networkd[1002]: eth1: Gained carrier May 10 00:43:54.117377 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:43:54.118442 systemd-networkd[1002]: eth0: Link UP May 10 00:43:54.118456 systemd-networkd[1002]: eth0: Gained carrier May 10 00:43:54.154888 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 10 00:43:54.167891 kernel: ACPI: button: Power Button [PWRF] May 10 00:43:54.168000 audit[998]: AVC avc: denied { confidentiality } for pid=998 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:43:54.168000 audit[998]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55572dbd52c0 a1=338ac a2=7f1d7b539bc5 a3=5 items=110 ppid=996 pid=998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:54.168000 audit: CWD cwd="/" May 10 00:43:54.168000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=1 name=(null) inode=14080 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=2 name=(null) inode=14080 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=3 name=(null) inode=14081 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=4 name=(null) inode=14080 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=5 name=(null) inode=14082 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=6 name=(null) inode=14080 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=7 name=(null) inode=14083 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=8 name=(null) inode=14083 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=9 name=(null) inode=14084 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=10 name=(null) inode=14083 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=11 name=(null) inode=14085 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=12 name=(null) inode=14083 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=13 name=(null) inode=14086 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=14 name=(null) inode=14083 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=15 name=(null) inode=14087 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=16 name=(null) inode=14083 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=17 name=(null) inode=14088 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=18 name=(null) inode=14080 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=19 name=(null) inode=14089 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=20 name=(null) inode=14089 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=21 name=(null) inode=14090 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=22 name=(null) inode=14089 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=23 name=(null) inode=14091 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=24 name=(null) inode=14089 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=25 name=(null) inode=14092 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=26 name=(null) inode=14089 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=27 name=(null) inode=14093 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=28 name=(null) inode=14089 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=29 name=(null) inode=14094 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=30 name=(null) inode=14080 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=31 name=(null) inode=14095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=32 name=(null) inode=14095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=33 name=(null) inode=14096 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=34 name=(null) inode=14095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=35 name=(null) inode=14097 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=36 name=(null) inode=14095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=37 name=(null) inode=14098 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=38 name=(null) inode=14095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=39 name=(null) inode=14099 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=40 name=(null) inode=14095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=41 name=(null) inode=14100 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=42 name=(null) inode=14080 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=43 name=(null) inode=14101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=44 name=(null) inode=14101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=45 name=(null) inode=14102 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=46 name=(null) inode=14101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=47 name=(null) inode=14103 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=48 name=(null) inode=14101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=49 name=(null) inode=14104 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=50 name=(null) inode=14101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=51 name=(null) inode=14105 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=52 name=(null) inode=14101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=53 name=(null) inode=14106 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=55 name=(null) inode=14107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=56 name=(null) inode=14107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=57 name=(null) inode=14108 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=58 name=(null) inode=14107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=59 name=(null) inode=14109 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=60 name=(null) inode=14107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=61 name=(null) inode=14110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=62 name=(null) inode=14110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=63 name=(null) inode=14111 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=64 name=(null) inode=14110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=65 name=(null) inode=14112 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=66 name=(null) inode=14110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=67 name=(null) inode=14113 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=68 name=(null) inode=14110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=69 name=(null) inode=14114 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=70 name=(null) inode=14110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=71 name=(null) inode=14115 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=72 name=(null) inode=14107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=73 name=(null) inode=14116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=74 name=(null) inode=14116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=75 name=(null) inode=14117 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=76 name=(null) inode=14116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=77 name=(null) inode=14118 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=78 name=(null) inode=14116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=79 name=(null) inode=14119 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=80 name=(null) inode=14116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=81 name=(null) inode=14120 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=82 name=(null) inode=14116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=83 name=(null) inode=14121 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=84 name=(null) inode=14107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=85 name=(null) inode=14122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=86 name=(null) inode=14122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=87 name=(null) inode=14123 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=88 name=(null) inode=14122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=89 name=(null) inode=14124 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=90 name=(null) inode=14122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=91 name=(null) inode=14125 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=92 name=(null) inode=14122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=93 name=(null) inode=14126 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=94 name=(null) inode=14122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=95 name=(null) inode=14127 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=96 name=(null) inode=14107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=97 name=(null) inode=14128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=98 name=(null) inode=14128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=99 name=(null) inode=14129 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=100 name=(null) inode=14128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=101 name=(null) inode=14130 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=102 name=(null) inode=14128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=103 name=(null) inode=14131 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=104 name=(null) inode=14128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=105 name=(null) inode=14132 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=106 name=(null) inode=14128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=107 name=(null) inode=14133 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PATH item=109 name=(null) inode=14382 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:54.168000 audit: PROCTITLE proctitle="(udev-worker)" May 10 00:43:54.245883 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 May 10 00:43:54.268888 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 10 00:43:54.274934 kernel: mousedev: PS/2 mouse device common for all mice May 10 00:43:54.403883 kernel: EDAC MC: Ver: 3.0.0 May 10 00:43:54.429500 systemd[1]: Finished systemd-udev-settle.service. May 10 00:43:54.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.432311 systemd[1]: Starting lvm2-activation-early.service... May 10 00:43:54.459529 lvm[1034]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:43:54.487870 systemd[1]: Finished lvm2-activation-early.service. May 10 00:43:54.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.488617 systemd[1]: Reached target cryptsetup.target. May 10 00:43:54.491611 systemd[1]: Starting lvm2-activation.service... May 10 00:43:54.498107 lvm[1035]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:43:54.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.523526 systemd[1]: Finished lvm2-activation.service. May 10 00:43:54.524238 systemd[1]: Reached target local-fs-pre.target. May 10 00:43:54.526596 systemd[1]: Mounting media-configdrive.mount... May 10 00:43:54.527021 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 00:43:54.527079 systemd[1]: Reached target machines.target. May 10 00:43:54.528769 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 00:43:54.545894 kernel: ISO 9660 Extensions: RRIP_1991A May 10 00:43:54.547420 systemd[1]: Mounted media-configdrive.mount. May 10 00:43:54.548094 systemd[1]: Reached target local-fs.target. May 10 00:43:54.551043 systemd[1]: Starting ldconfig.service... May 10 00:43:54.552609 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:43:54.552737 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:43:54.555083 systemd[1]: Starting systemd-boot-update.service... May 10 00:43:54.557520 systemd[1]: Starting systemd-machine-id-commit.service... May 10 00:43:54.560275 systemd[1]: Starting systemd-sysext.service... May 10 00:43:54.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.563756 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 00:43:54.575322 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1041 (bootctl) May 10 00:43:54.577117 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 00:43:54.584471 systemd[1]: Unmounting usr-share-oem.mount... May 10 00:43:54.604207 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 10 00:43:54.604479 systemd[1]: Unmounted usr-share-oem.mount. May 10 00:43:54.615687 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 00:43:54.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.618988 systemd[1]: Finished systemd-machine-id-commit.service. May 10 00:43:54.632949 kernel: loop0: detected capacity change from 0 to 210664 May 10 00:43:54.668879 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 10 00:43:54.693872 kernel: loop1: detected capacity change from 0 to 210664 May 10 00:43:54.702414 systemd-fsck[1048]: fsck.fat 4.2 (2021-01-31) May 10 00:43:54.702414 systemd-fsck[1048]: /dev/vda1: 790 files, 120688/258078 clusters May 10 00:43:54.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.708633 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 00:43:54.711663 systemd[1]: Mounting boot.mount... May 10 00:43:54.730537 (sd-sysext)[1051]: Using extensions 'kubernetes'. May 10 00:43:54.734092 (sd-sysext)[1051]: Merged extensions into '/usr'. May 10 00:43:54.750219 systemd[1]: Mounted boot.mount. May 10 00:43:54.775086 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:43:54.780735 systemd[1]: Mounting usr-share-oem.mount... May 10 00:43:54.781691 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:43:54.787150 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:43:54.790332 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:43:54.795299 systemd[1]: Starting modprobe@loop.service... May 10 00:43:54.795915 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:43:54.796614 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:43:54.796828 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:43:54.798855 systemd[1]: Finished systemd-boot-update.service. May 10 00:43:54.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.806627 systemd[1]: Mounted usr-share-oem.mount. May 10 00:43:54.808243 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:43:54.808452 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:43:54.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.810193 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:43:54.810394 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:43:54.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.812272 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:43:54.812531 systemd[1]: Finished modprobe@loop.service. May 10 00:43:54.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.815077 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:43:54.815307 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:43:54.817782 systemd[1]: Finished systemd-sysext.service. May 10 00:43:54.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.821351 systemd[1]: Starting ensure-sysext.service... May 10 00:43:54.823556 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 00:43:54.840411 systemd[1]: Reloading. May 10 00:43:54.876631 systemd-tmpfiles[1060]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 00:43:54.887424 systemd-tmpfiles[1060]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 00:43:54.901407 systemd-tmpfiles[1060]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 00:43:54.946516 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2025-05-10T00:43:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:43:54.946561 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2025-05-10T00:43:54Z" level=info msg="torcx already run" May 10 00:43:55.028233 ldconfig[1040]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 00:43:55.147490 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:43:55.147513 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:43:55.178460 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:43:55.213120 systemd-networkd[1002]: eth0: Gained IPv6LL May 10 00:43:55.284000 audit: BPF prog-id=24 op=LOAD May 10 00:43:55.284000 audit: BPF prog-id=25 op=LOAD May 10 00:43:55.284000 audit: BPF prog-id=18 op=UNLOAD May 10 00:43:55.284000 audit: BPF prog-id=19 op=UNLOAD May 10 00:43:55.286000 audit: BPF prog-id=26 op=LOAD May 10 00:43:55.286000 audit: BPF prog-id=15 op=UNLOAD May 10 00:43:55.286000 audit: BPF prog-id=27 op=LOAD May 10 00:43:55.286000 audit: BPF prog-id=28 op=LOAD May 10 00:43:55.286000 audit: BPF prog-id=16 op=UNLOAD May 10 00:43:55.286000 audit: BPF prog-id=17 op=UNLOAD May 10 00:43:55.289000 audit: BPF prog-id=29 op=LOAD May 10 00:43:55.289000 audit: BPF prog-id=20 op=UNLOAD May 10 00:43:55.291000 audit: BPF prog-id=30 op=LOAD May 10 00:43:55.291000 audit: BPF prog-id=21 op=UNLOAD May 10 00:43:55.291000 audit: BPF prog-id=31 op=LOAD May 10 00:43:55.291000 audit: BPF prog-id=32 op=LOAD May 10 00:43:55.291000 audit: BPF prog-id=22 op=UNLOAD May 10 00:43:55.291000 audit: BPF prog-id=23 op=UNLOAD May 10 00:43:55.299447 systemd[1]: Finished ldconfig.service. May 10 00:43:55.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.303037 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 00:43:55.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.310898 systemd[1]: Starting audit-rules.service... May 10 00:43:55.313917 systemd[1]: Starting clean-ca-certificates.service... May 10 00:43:55.319785 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 00:43:55.324000 audit: BPF prog-id=33 op=LOAD May 10 00:43:55.327261 systemd[1]: Starting systemd-resolved.service... May 10 00:43:55.330000 audit: BPF prog-id=34 op=LOAD May 10 00:43:55.333310 systemd[1]: Starting systemd-timesyncd.service... May 10 00:43:55.338263 systemd[1]: Starting systemd-update-utmp.service... May 10 00:43:55.340115 systemd[1]: Finished clean-ca-certificates.service. May 10 00:43:55.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.346673 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:43:55.352002 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:43:55.355684 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:43:55.362507 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:43:55.366518 systemd[1]: Starting modprobe@loop.service... May 10 00:43:55.367908 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:43:55.368206 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:43:55.368441 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:43:55.376292 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:43:55.376581 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:43:55.376785 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:43:55.376955 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:43:55.379042 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:43:55.379299 systemd[1]: Finished modprobe@loop.service. May 10 00:43:55.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.387641 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:43:55.391642 systemd[1]: Starting modprobe@drm.service... May 10 00:43:55.397262 systemd[1]: Starting modprobe@loop.service... May 10 00:43:55.398121 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:43:55.398426 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:43:55.402672 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:43:55.404395 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:43:55.406206 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:43:55.407991 systemd[1]: Finished modprobe@drm.service. May 10 00:43:55.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.409564 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:43:55.409816 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:43:55.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.415466 systemd[1]: Finished ensure-sysext.service. May 10 00:43:55.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.417079 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:43:55.421819 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 00:43:55.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.424000 audit[1133]: SYSTEM_BOOT pid=1133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 00:43:55.427155 systemd[1]: Starting systemd-update-done.service... May 10 00:43:55.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.430501 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:43:55.430782 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:43:55.435512 systemd[1]: Finished systemd-update-utmp.service. May 10 00:43:55.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.439452 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:43:55.439685 systemd[1]: Finished modprobe@loop.service. May 10 00:43:55.440572 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:43:55.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.444367 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 00:43:55.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.448441 systemd[1]: Finished systemd-update-done.service. May 10 00:43:55.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.487000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 00:43:55.487000 audit[1154]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffedf44b1b0 a2=420 a3=0 items=0 ppid=1127 pid=1154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.487000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 00:43:55.488961 augenrules[1154]: No rules May 10 00:43:55.489249 systemd[1]: Finished audit-rules.service. May 10 00:43:55.503581 systemd[1]: Started systemd-timesyncd.service. May 10 00:43:55.504395 systemd[1]: Reached target time-set.target. May 10 00:43:55.528767 systemd-resolved[1131]: Positive Trust Anchors: May 10 00:43:55.528790 systemd-resolved[1131]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:43:55.528837 systemd-resolved[1131]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:43:55.536186 systemd-resolved[1131]: Using system hostname 'ci-3510.3.7-n-3080830dac'. May 10 00:43:55.539597 systemd[1]: Started systemd-resolved.service. May 10 00:43:55.540292 systemd[1]: Reached target network.target. May 10 00:43:55.540765 systemd[1]: Reached target network-online.target. May 10 00:43:55.541285 systemd[1]: Reached target nss-lookup.target. May 10 00:43:55.541772 systemd[1]: Reached target sysinit.target. May 10 00:43:55.542409 systemd[1]: Started motdgen.path. May 10 00:43:55.542909 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 00:43:55.543725 systemd[1]: Started logrotate.timer. May 10 00:43:55.544345 systemd[1]: Started mdadm.timer. May 10 00:43:55.544807 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 00:43:55.545279 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 00:43:55.545339 systemd[1]: Reached target paths.target. May 10 00:43:55.554918 systemd[1]: Reached target timers.target. May 10 00:43:55.558005 systemd[1]: Listening on dbus.socket. May 10 00:43:55.560414 systemd[1]: Starting docker.socket... May 10 00:43:56.087410 systemd-resolved[1131]: Clock change detected. Flushing caches. May 10 00:43:56.087569 systemd-timesyncd[1132]: Contacted time server 23.150.41.123:123 (0.flatcar.pool.ntp.org). May 10 00:43:56.087653 systemd-timesyncd[1132]: Initial clock synchronization to Sat 2025-05-10 00:43:56.087355 UTC. May 10 00:43:56.090635 systemd[1]: Listening on sshd.socket. May 10 00:43:56.091385 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:43:56.094100 systemd[1]: Listening on docker.socket. May 10 00:43:56.094665 systemd[1]: Reached target sockets.target. May 10 00:43:56.095047 systemd[1]: Reached target basic.target. May 10 00:43:56.095351 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:43:56.095399 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:43:56.095429 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:43:56.096877 systemd[1]: Starting containerd.service... May 10 00:43:56.098859 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 10 00:43:56.101405 systemd[1]: Starting dbus.service... May 10 00:43:56.103923 systemd[1]: Starting enable-oem-cloudinit.service... May 10 00:43:56.107274 systemd[1]: Starting extend-filesystems.service... May 10 00:43:56.109228 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 00:43:56.113366 systemd[1]: Starting kubelet.service... May 10 00:43:56.155481 jq[1166]: false May 10 00:43:56.116128 systemd[1]: Starting motdgen.service... May 10 00:43:56.122856 systemd[1]: Starting prepare-helm.service... May 10 00:43:56.128661 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 00:43:56.131420 systemd[1]: Starting sshd-keygen.service... May 10 00:43:56.136329 systemd[1]: Starting systemd-logind.service... May 10 00:43:56.136892 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:43:56.137014 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 10 00:43:56.137598 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 10 00:43:56.140671 systemd[1]: Starting update-engine.service... May 10 00:43:56.143444 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 00:43:56.145675 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:43:56.148395 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 00:43:56.149073 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 00:43:56.175451 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 00:43:56.175677 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 00:43:56.184176 jq[1178]: true May 10 00:43:56.204002 tar[1181]: linux-amd64/helm May 10 00:43:56.234361 jq[1193]: true May 10 00:43:56.237903 dbus-daemon[1164]: [system] SELinux support is enabled May 10 00:43:56.238722 systemd[1]: Started dbus.service. May 10 00:43:56.242605 systemd[1]: motdgen.service: Deactivated successfully. May 10 00:43:56.242884 systemd[1]: Finished motdgen.service. May 10 00:43:56.243630 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 00:43:56.243676 systemd[1]: Reached target system-config.target. May 10 00:43:56.244151 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 00:43:56.244182 systemd[1]: Reached target user-config.target. May 10 00:43:56.250003 systemd-networkd[1002]: eth1: Gained IPv6LL May 10 00:43:56.257764 extend-filesystems[1167]: Found loop1 May 10 00:43:56.260765 extend-filesystems[1167]: Found vda May 10 00:43:56.260765 extend-filesystems[1167]: Found vda1 May 10 00:43:56.260765 extend-filesystems[1167]: Found vda2 May 10 00:43:56.260765 extend-filesystems[1167]: Found vda3 May 10 00:43:56.260765 extend-filesystems[1167]: Found usr May 10 00:43:56.260765 extend-filesystems[1167]: Found vda4 May 10 00:43:56.260765 extend-filesystems[1167]: Found vda6 May 10 00:43:56.260765 extend-filesystems[1167]: Found vda7 May 10 00:43:56.260765 extend-filesystems[1167]: Found vda9 May 10 00:43:56.260765 extend-filesystems[1167]: Checking size of /dev/vda9 May 10 00:43:56.318411 extend-filesystems[1167]: Resized partition /dev/vda9 May 10 00:43:56.331826 extend-filesystems[1214]: resize2fs 1.46.5 (30-Dec-2021) May 10 00:43:56.340868 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 15121403 blocks May 10 00:43:56.352122 update_engine[1177]: I0510 00:43:56.351492 1177 main.cc:92] Flatcar Update Engine starting May 10 00:43:56.357968 systemd[1]: Started update-engine.service. May 10 00:43:56.358398 update_engine[1177]: I0510 00:43:56.358359 1177 update_check_scheduler.cc:74] Next update check in 10m27s May 10 00:43:56.360892 systemd[1]: Started locksmithd.service. May 10 00:43:56.409880 bash[1218]: Updated "/home/core/.ssh/authorized_keys" May 10 00:43:56.410493 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 00:43:56.458350 env[1184]: time="2025-05-10T00:43:56.458271350Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 00:43:56.490787 kernel: EXT4-fs (vda9): resized filesystem to 15121403 May 10 00:43:56.512232 env[1184]: time="2025-05-10T00:43:56.511672569Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 00:43:56.512232 env[1184]: time="2025-05-10T00:43:56.512185825Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 00:43:56.513206 systemd-logind[1176]: Watching system buttons on /dev/input/event1 (Power Button) May 10 00:43:56.513248 systemd-logind[1176]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 00:43:56.514259 env[1184]: time="2025-05-10T00:43:56.514125041Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 00:43:56.514259 env[1184]: time="2025-05-10T00:43:56.514165255Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 00:43:56.514188 systemd-logind[1176]: New seat seat0. May 10 00:43:56.514485 env[1184]: time="2025-05-10T00:43:56.514420544Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:43:56.514485 env[1184]: time="2025-05-10T00:43:56.514439446Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 00:43:56.514485 env[1184]: time="2025-05-10T00:43:56.514452602Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 00:43:56.514485 env[1184]: time="2025-05-10T00:43:56.514462672Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 00:43:56.514714 env[1184]: time="2025-05-10T00:43:56.514536845Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 00:43:56.516248 env[1184]: time="2025-05-10T00:43:56.515422782Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 00:43:56.517299 systemd[1]: Started systemd-logind.service. May 10 00:43:56.520909 extend-filesystems[1214]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 10 00:43:56.520909 extend-filesystems[1214]: old_desc_blocks = 1, new_desc_blocks = 8 May 10 00:43:56.520909 extend-filesystems[1214]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. May 10 00:43:56.519477 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 00:43:56.525865 extend-filesystems[1167]: Resized filesystem in /dev/vda9 May 10 00:43:56.525865 extend-filesystems[1167]: Found vdb May 10 00:43:56.519760 systemd[1]: Finished extend-filesystems.service. May 10 00:43:56.529873 env[1184]: time="2025-05-10T00:43:56.529066311Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:43:56.529873 env[1184]: time="2025-05-10T00:43:56.529110267Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 00:43:56.529873 env[1184]: time="2025-05-10T00:43:56.529233348Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 00:43:56.529873 env[1184]: time="2025-05-10T00:43:56.529246550Z" level=info msg="metadata content store policy set" policy=shared May 10 00:43:56.532998 env[1184]: time="2025-05-10T00:43:56.532926305Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 00:43:56.532998 env[1184]: time="2025-05-10T00:43:56.532992350Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 00:43:56.533241 env[1184]: time="2025-05-10T00:43:56.533015181Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 00:43:56.533241 env[1184]: time="2025-05-10T00:43:56.533118048Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 00:43:56.533241 env[1184]: time="2025-05-10T00:43:56.533149972Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 00:43:56.533241 env[1184]: time="2025-05-10T00:43:56.533175994Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 00:43:56.533241 env[1184]: time="2025-05-10T00:43:56.533201238Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 00:43:56.533241 env[1184]: time="2025-05-10T00:43:56.533230932Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 00:43:56.533481 env[1184]: time="2025-05-10T00:43:56.533257105Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 00:43:56.533481 env[1184]: time="2025-05-10T00:43:56.533320949Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 00:43:56.533481 env[1184]: time="2025-05-10T00:43:56.533350310Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 00:43:56.533481 env[1184]: time="2025-05-10T00:43:56.533377658Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 00:43:56.538801 env[1184]: time="2025-05-10T00:43:56.533645343Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 00:43:56.538801 env[1184]: time="2025-05-10T00:43:56.533835455Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 00:43:56.538801 env[1184]: time="2025-05-10T00:43:56.534257901Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 00:43:56.538801 env[1184]: time="2025-05-10T00:43:56.534309523Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 00:43:56.538801 env[1184]: time="2025-05-10T00:43:56.534337835Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 00:43:56.538801 env[1184]: time="2025-05-10T00:43:56.534412945Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 00:43:56.538801 env[1184]: time="2025-05-10T00:43:56.534437384Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 00:43:56.538801 env[1184]: time="2025-05-10T00:43:56.534462064Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 00:43:56.538801 env[1184]: time="2025-05-10T00:43:56.534484511Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 00:43:56.538801 env[1184]: time="2025-05-10T00:43:56.534506747Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 00:43:56.538801 env[1184]: time="2025-05-10T00:43:56.534532478Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 00:43:56.538801 env[1184]: time="2025-05-10T00:43:56.534560003Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 00:43:56.538801 env[1184]: time="2025-05-10T00:43:56.534582402Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 00:43:56.538801 env[1184]: time="2025-05-10T00:43:56.534608811Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 00:43:56.538801 env[1184]: time="2025-05-10T00:43:56.535841017Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 00:43:56.539848 env[1184]: time="2025-05-10T00:43:56.535886177Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 00:43:56.539848 env[1184]: time="2025-05-10T00:43:56.535915293Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 00:43:56.539848 env[1184]: time="2025-05-10T00:43:56.535941398Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 00:43:56.539848 env[1184]: time="2025-05-10T00:43:56.535983263Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 00:43:56.539848 env[1184]: time="2025-05-10T00:43:56.536000797Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 00:43:56.539848 env[1184]: time="2025-05-10T00:43:56.536033145Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 00:43:56.539848 env[1184]: time="2025-05-10T00:43:56.536083656Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 00:43:56.540181 env[1184]: time="2025-05-10T00:43:56.536405662Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 00:43:56.540181 env[1184]: time="2025-05-10T00:43:56.536494459Z" level=info msg="Connect containerd service" May 10 00:43:56.540181 env[1184]: time="2025-05-10T00:43:56.536545272Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 00:43:56.546329 env[1184]: time="2025-05-10T00:43:56.543593070Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:43:56.550879 env[1184]: time="2025-05-10T00:43:56.549859543Z" level=info msg="Start subscribing containerd event" May 10 00:43:56.550879 env[1184]: time="2025-05-10T00:43:56.549958419Z" level=info msg="Start recovering state" May 10 00:43:56.550879 env[1184]: time="2025-05-10T00:43:56.550078848Z" level=info msg="Start event monitor" May 10 00:43:56.550879 env[1184]: time="2025-05-10T00:43:56.550113448Z" level=info msg="Start snapshots syncer" May 10 00:43:56.550879 env[1184]: time="2025-05-10T00:43:56.550130472Z" level=info msg="Start cni network conf syncer for default" May 10 00:43:56.550879 env[1184]: time="2025-05-10T00:43:56.550144514Z" level=info msg="Start streaming server" May 10 00:43:56.550879 env[1184]: time="2025-05-10T00:43:56.550773012Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 00:43:56.550879 env[1184]: time="2025-05-10T00:43:56.550863059Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 00:43:56.551072 systemd[1]: Started containerd.service. May 10 00:43:56.553336 env[1184]: time="2025-05-10T00:43:56.551722735Z" level=info msg="containerd successfully booted in 0.104775s" May 10 00:43:56.613158 coreos-metadata[1163]: May 10 00:43:56.612 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 10 00:43:56.631623 coreos-metadata[1163]: May 10 00:43:56.626 INFO Fetch successful May 10 00:43:56.649278 unknown[1163]: wrote ssh authorized keys file for user: core May 10 00:43:56.667605 update-ssh-keys[1226]: Updated "/home/core/.ssh/authorized_keys" May 10 00:43:56.668059 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 10 00:43:57.353952 tar[1181]: linux-amd64/LICENSE May 10 00:43:57.354401 tar[1181]: linux-amd64/README.md May 10 00:43:57.361217 systemd[1]: Finished prepare-helm.service. May 10 00:43:57.412005 locksmithd[1219]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 00:43:57.431524 sshd_keygen[1194]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 00:43:57.471258 systemd[1]: Finished sshd-keygen.service. May 10 00:43:57.474675 systemd[1]: Starting issuegen.service... May 10 00:43:57.486062 systemd[1]: issuegen.service: Deactivated successfully. May 10 00:43:57.486375 systemd[1]: Finished issuegen.service. May 10 00:43:57.490745 systemd[1]: Starting systemd-user-sessions.service... May 10 00:43:57.510939 systemd[1]: Finished systemd-user-sessions.service. May 10 00:43:57.515402 systemd[1]: Started getty@tty1.service. May 10 00:43:57.519931 systemd[1]: Started serial-getty@ttyS0.service. May 10 00:43:57.521183 systemd[1]: Reached target getty.target. May 10 00:43:57.882490 systemd[1]: Started kubelet.service. May 10 00:43:57.884366 systemd[1]: Reached target multi-user.target. May 10 00:43:57.889337 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 00:43:57.903784 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 00:43:57.904150 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 00:43:57.905104 systemd[1]: Startup finished in 1.083s (kernel) + 5.175s (initrd) + 8.437s (userspace) = 14.696s. May 10 00:43:58.204811 systemd[1]: Created slice system-sshd.slice. May 10 00:43:58.206908 systemd[1]: Started sshd@0-143.198.48.176:22-139.178.68.195:49018.service. May 10 00:43:58.293169 sshd[1255]: Accepted publickey for core from 139.178.68.195 port 49018 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:43:58.294610 sshd[1255]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:43:58.314386 systemd[1]: Created slice user-500.slice. May 10 00:43:58.319786 systemd[1]: Starting user-runtime-dir@500.service... May 10 00:43:58.324206 systemd-logind[1176]: New session 1 of user core. May 10 00:43:58.336017 systemd[1]: Finished user-runtime-dir@500.service. May 10 00:43:58.343674 systemd[1]: Starting user@500.service... May 10 00:43:58.349350 (systemd)[1258]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 00:43:58.488697 systemd[1258]: Queued start job for default target default.target. May 10 00:43:58.489596 systemd[1258]: Reached target paths.target. May 10 00:43:58.489635 systemd[1258]: Reached target sockets.target. May 10 00:43:58.489655 systemd[1258]: Reached target timers.target. May 10 00:43:58.489673 systemd[1258]: Reached target basic.target. May 10 00:43:58.489872 systemd[1]: Started user@500.service. May 10 00:43:58.491861 systemd[1]: Started session-1.scope. May 10 00:43:58.493045 systemd[1258]: Reached target default.target. May 10 00:43:58.493371 systemd[1258]: Startup finished in 128ms. May 10 00:43:58.563676 systemd[1]: Started sshd@1-143.198.48.176:22-139.178.68.195:49030.service. May 10 00:43:58.646780 sshd[1268]: Accepted publickey for core from 139.178.68.195 port 49030 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:43:58.649634 sshd[1268]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:43:58.658651 systemd-logind[1176]: New session 2 of user core. May 10 00:43:58.659009 systemd[1]: Started session-2.scope. May 10 00:43:58.736438 sshd[1268]: pam_unix(sshd:session): session closed for user core May 10 00:43:58.746450 systemd[1]: Started sshd@2-143.198.48.176:22-139.178.68.195:49042.service. May 10 00:43:58.753329 systemd-logind[1176]: Session 2 logged out. Waiting for processes to exit. May 10 00:43:58.753557 systemd[1]: sshd@1-143.198.48.176:22-139.178.68.195:49030.service: Deactivated successfully. May 10 00:43:58.754890 systemd[1]: session-2.scope: Deactivated successfully. May 10 00:43:58.757561 systemd-logind[1176]: Removed session 2. May 10 00:43:58.808769 sshd[1273]: Accepted publickey for core from 139.178.68.195 port 49042 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:43:58.811187 sshd[1273]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:43:58.822071 systemd-logind[1176]: New session 3 of user core. May 10 00:43:58.823597 systemd[1]: Started session-3.scope. May 10 00:43:58.890347 sshd[1273]: pam_unix(sshd:session): session closed for user core May 10 00:43:58.899142 systemd[1]: Started sshd@3-143.198.48.176:22-139.178.68.195:49048.service. May 10 00:43:58.900615 systemd[1]: sshd@2-143.198.48.176:22-139.178.68.195:49042.service: Deactivated successfully. May 10 00:43:58.901867 systemd[1]: session-3.scope: Deactivated successfully. May 10 00:43:58.905078 systemd-logind[1176]: Session 3 logged out. Waiting for processes to exit. May 10 00:43:58.906640 systemd-logind[1176]: Removed session 3. May 10 00:43:58.955589 sshd[1279]: Accepted publickey for core from 139.178.68.195 port 49048 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:43:58.957319 kubelet[1248]: E0510 00:43:58.957269 1248 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:43:58.958763 sshd[1279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:43:58.960249 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:43:58.960445 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:43:58.960857 systemd[1]: kubelet.service: Consumed 1.453s CPU time. May 10 00:43:58.966975 systemd-logind[1176]: New session 4 of user core. May 10 00:43:58.967594 systemd[1]: Started session-4.scope. May 10 00:43:59.047578 sshd[1279]: pam_unix(sshd:session): session closed for user core May 10 00:43:59.055081 systemd[1]: Started sshd@4-143.198.48.176:22-139.178.68.195:49060.service. May 10 00:43:59.057214 systemd[1]: sshd@3-143.198.48.176:22-139.178.68.195:49048.service: Deactivated successfully. May 10 00:43:59.058034 systemd[1]: session-4.scope: Deactivated successfully. May 10 00:43:59.060265 systemd-logind[1176]: Session 4 logged out. Waiting for processes to exit. May 10 00:43:59.062091 systemd-logind[1176]: Removed session 4. May 10 00:43:59.105680 sshd[1286]: Accepted publickey for core from 139.178.68.195 port 49060 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:43:59.107977 sshd[1286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:43:59.120502 systemd-logind[1176]: New session 5 of user core. May 10 00:43:59.122186 systemd[1]: Started session-5.scope. May 10 00:43:59.230008 sudo[1290]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 00:43:59.231000 sudo[1290]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:43:59.241403 dbus-daemon[1164]: \xd0M\u00050\xd9U: received setenforce notice (enforcing=-541681984) May 10 00:43:59.244233 sudo[1290]: pam_unix(sudo:session): session closed for user root May 10 00:43:59.250334 sshd[1286]: pam_unix(sshd:session): session closed for user core May 10 00:43:59.261015 systemd[1]: Started sshd@5-143.198.48.176:22-139.178.68.195:49066.service. May 10 00:43:59.263628 systemd[1]: sshd@4-143.198.48.176:22-139.178.68.195:49060.service: Deactivated successfully. May 10 00:43:59.265028 systemd[1]: session-5.scope: Deactivated successfully. May 10 00:43:59.269187 systemd-logind[1176]: Session 5 logged out. Waiting for processes to exit. May 10 00:43:59.271835 systemd-logind[1176]: Removed session 5. May 10 00:43:59.321637 sshd[1293]: Accepted publickey for core from 139.178.68.195 port 49066 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:43:59.323813 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:43:59.332452 systemd[1]: Started session-6.scope. May 10 00:43:59.333135 systemd-logind[1176]: New session 6 of user core. May 10 00:43:59.415990 sudo[1298]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 00:43:59.421459 sudo[1298]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:43:59.429393 sudo[1298]: pam_unix(sudo:session): session closed for user root May 10 00:43:59.440021 sudo[1297]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 00:43:59.440777 sudo[1297]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:43:59.459499 systemd[1]: Stopping audit-rules.service... May 10 00:43:59.461000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:43:59.463458 kernel: kauditd_printk_skb: 178 callbacks suppressed May 10 00:43:59.463577 kernel: audit: type=1305 audit(1746837839.461:208): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:43:59.463953 auditctl[1301]: No rules May 10 00:43:59.465869 systemd[1]: audit-rules.service: Deactivated successfully. May 10 00:43:59.479916 kernel: audit: type=1300 audit(1746837839.461:208): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffef7ef43d0 a2=420 a3=0 items=0 ppid=1 pid=1301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:59.480057 kernel: audit: type=1327 audit(1746837839.461:208): proctitle=2F7362696E2F617564697463746C002D44 May 10 00:43:59.480271 kernel: audit: type=1131 audit(1746837839.465:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:59.461000 audit[1301]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffef7ef43d0 a2=420 a3=0 items=0 ppid=1 pid=1301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:59.461000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 00:43:59.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:59.466175 systemd[1]: Stopped audit-rules.service. May 10 00:43:59.474464 systemd[1]: Starting audit-rules.service... May 10 00:43:59.512840 augenrules[1318]: No rules May 10 00:43:59.514795 systemd[1]: Finished audit-rules.service. May 10 00:43:59.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:59.514000 audit[1297]: USER_END pid=1297 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:43:59.517183 sudo[1297]: pam_unix(sudo:session): session closed for user root May 10 00:43:59.523068 kernel: audit: type=1130 audit(1746837839.514:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:59.523215 kernel: audit: type=1106 audit(1746837839.514:211): pid=1297 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:43:59.524140 sshd[1293]: pam_unix(sshd:session): session closed for user core May 10 00:43:59.514000 audit[1297]: CRED_DISP pid=1297 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:43:59.524000 audit[1293]: USER_END pid=1293 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:43:59.534138 kernel: audit: type=1104 audit(1746837839.514:212): pid=1297 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:43:59.534252 kernel: audit: type=1106 audit(1746837839.524:213): pid=1293 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:43:59.534346 kernel: audit: type=1104 audit(1746837839.524:214): pid=1293 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:43:59.524000 audit[1293]: CRED_DISP pid=1293 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:43:59.538359 kernel: audit: type=1131 audit(1746837839.533:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-143.198.48.176:22-139.178.68.195:49066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:59.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-143.198.48.176:22-139.178.68.195:49066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:59.536339 systemd[1]: sshd@5-143.198.48.176:22-139.178.68.195:49066.service: Deactivated successfully. May 10 00:43:59.539294 systemd-logind[1176]: Session 6 logged out. Waiting for processes to exit. May 10 00:43:59.540799 systemd[1]: session-6.scope: Deactivated successfully. May 10 00:43:59.545868 systemd[1]: Started sshd@6-143.198.48.176:22-139.178.68.195:49076.service. May 10 00:43:59.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-143.198.48.176:22-139.178.68.195:49076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:59.548387 systemd-logind[1176]: Removed session 6. May 10 00:43:59.596000 audit[1324]: USER_ACCT pid=1324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:43:59.597417 sshd[1324]: Accepted publickey for core from 139.178.68.195 port 49076 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:43:59.599000 audit[1324]: CRED_ACQ pid=1324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:43:59.599000 audit[1324]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc31451e30 a2=3 a3=0 items=0 ppid=1 pid=1324 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:59.599000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:43:59.600951 sshd[1324]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:43:59.614122 systemd[1]: Started session-7.scope. May 10 00:43:59.614131 systemd-logind[1176]: New session 7 of user core. May 10 00:43:59.623000 audit[1324]: USER_START pid=1324 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:43:59.627000 audit[1326]: CRED_ACQ pid=1326 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:43:59.686000 audit[1327]: USER_ACCT pid=1327 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:43:59.687200 sudo[1327]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 10 00:43:59.686000 audit[1327]: CRED_REFR pid=1327 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:43:59.687593 sudo[1327]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:43:59.689000 audit[1327]: USER_START pid=1327 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:43:59.736838 systemd[1]: Starting docker.service... May 10 00:43:59.809891 env[1337]: time="2025-05-10T00:43:59.809818426Z" level=info msg="Starting up" May 10 00:43:59.817024 env[1337]: time="2025-05-10T00:43:59.816598774Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:43:59.817236 env[1337]: time="2025-05-10T00:43:59.817205145Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:43:59.817395 env[1337]: time="2025-05-10T00:43:59.817348059Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:43:59.817551 env[1337]: time="2025-05-10T00:43:59.817499304Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:43:59.821009 env[1337]: time="2025-05-10T00:43:59.820944386Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:43:59.821009 env[1337]: time="2025-05-10T00:43:59.820982791Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:43:59.821009 env[1337]: time="2025-05-10T00:43:59.821009218Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:43:59.821009 env[1337]: time="2025-05-10T00:43:59.821023174Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:43:59.830051 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport394381338-merged.mount: Deactivated successfully. May 10 00:43:59.911477 env[1337]: time="2025-05-10T00:43:59.911414877Z" level=info msg="Loading containers: start." May 10 00:44:00.041000 audit[1369]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1369 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.041000 audit[1369]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd66865820 a2=0 a3=7ffd6686580c items=0 ppid=1337 pid=1369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.041000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 10 00:44:00.045000 audit[1371]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1371 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.045000 audit[1371]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe82650ab0 a2=0 a3=7ffe82650a9c items=0 ppid=1337 pid=1371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.045000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 10 00:44:00.049000 audit[1373]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1373 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.049000 audit[1373]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc718f0170 a2=0 a3=7ffc718f015c items=0 ppid=1337 pid=1373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.049000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:44:00.052000 audit[1375]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1375 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.052000 audit[1375]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff4c14f320 a2=0 a3=7fff4c14f30c items=0 ppid=1337 pid=1375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.052000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:44:00.060000 audit[1377]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1377 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.060000 audit[1377]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdf810f7a0 a2=0 a3=7ffdf810f78c items=0 ppid=1337 pid=1377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.060000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 10 00:44:00.086000 audit[1382]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1382 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.086000 audit[1382]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd51477c10 a2=0 a3=7ffd51477bfc items=0 ppid=1337 pid=1382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.086000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 10 00:44:00.096000 audit[1384]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1384 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.096000 audit[1384]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe6e291450 a2=0 a3=7ffe6e29143c items=0 ppid=1337 pid=1384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.096000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 10 00:44:00.101000 audit[1386]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1386 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.101000 audit[1386]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fffc187b790 a2=0 a3=7fffc187b77c items=0 ppid=1337 pid=1386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.101000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 10 00:44:00.105000 audit[1388]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.105000 audit[1388]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd2cc671e0 a2=0 a3=7ffd2cc671cc items=0 ppid=1337 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.105000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:44:00.124000 audit[1392]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1392 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.124000 audit[1392]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffff58744a0 a2=0 a3=7ffff587448c items=0 ppid=1337 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.124000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:44:00.130000 audit[1393]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.130000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffef858f2e0 a2=0 a3=7ffef858f2cc items=0 ppid=1337 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.130000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:44:00.146886 kernel: Initializing XFRM netlink socket May 10 00:44:00.207322 env[1337]: time="2025-05-10T00:44:00.207189034Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 10 00:44:00.252000 audit[1401]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.252000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd77bde890 a2=0 a3=7ffd77bde87c items=0 ppid=1337 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.252000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 10 00:44:00.268000 audit[1404]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.268000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffcdddd3c90 a2=0 a3=7ffcdddd3c7c items=0 ppid=1337 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.268000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 10 00:44:00.283000 audit[1407]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.283000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe71434ec0 a2=0 a3=7ffe71434eac items=0 ppid=1337 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.283000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 10 00:44:00.288000 audit[1409]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.288000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff131c0880 a2=0 a3=7fff131c086c items=0 ppid=1337 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.288000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 10 00:44:00.292000 audit[1411]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.292000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffcfb214360 a2=0 a3=7ffcfb21434c items=0 ppid=1337 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.292000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 10 00:44:00.297000 audit[1413]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.297000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff5c68aa60 a2=0 a3=7fff5c68aa4c items=0 ppid=1337 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.297000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 10 00:44:00.302000 audit[1415]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.302000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffd6907080 a2=0 a3=7fffd690706c items=0 ppid=1337 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.302000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 10 00:44:00.319000 audit[1418]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.319000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffed6f64420 a2=0 a3=7ffed6f6440c items=0 ppid=1337 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.319000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 10 00:44:00.326000 audit[1420]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.326000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe564c0480 a2=0 a3=7ffe564c046c items=0 ppid=1337 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.326000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:44:00.330000 audit[1422]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.330000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe3080d150 a2=0 a3=7ffe3080d13c items=0 ppid=1337 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.330000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:44:00.336000 audit[1424]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.336000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffed538cb00 a2=0 a3=7ffed538caec items=0 ppid=1337 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.336000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 10 00:44:00.338366 systemd-networkd[1002]: docker0: Link UP May 10 00:44:00.359000 audit[1428]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.359000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd9e1a9960 a2=0 a3=7ffd9e1a994c items=0 ppid=1337 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.359000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:44:00.365000 audit[1429]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:00.365000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc0c048c30 a2=0 a3=7ffc0c048c1c items=0 ppid=1337 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.365000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:44:00.367581 env[1337]: time="2025-05-10T00:44:00.367410647Z" level=info msg="Loading containers: done." May 10 00:44:00.385207 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck251699531-merged.mount: Deactivated successfully. May 10 00:44:00.395006 env[1337]: time="2025-05-10T00:44:00.394731736Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 10 00:44:00.395326 env[1337]: time="2025-05-10T00:44:00.395273699Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 10 00:44:00.395512 env[1337]: time="2025-05-10T00:44:00.395477426Z" level=info msg="Daemon has completed initialization" May 10 00:44:00.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.417689 systemd[1]: Started docker.service. May 10 00:44:00.430689 env[1337]: time="2025-05-10T00:44:00.430535887Z" level=info msg="API listen on /run/docker.sock" May 10 00:44:00.470350 systemd[1]: Starting coreos-metadata.service... May 10 00:44:00.541444 coreos-metadata[1455]: May 10 00:44:00.541 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 10 00:44:00.558173 coreos-metadata[1455]: May 10 00:44:00.557 INFO Fetch successful May 10 00:44:00.578294 systemd[1]: Finished coreos-metadata.service. May 10 00:44:00.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.119885 env[1184]: time="2025-05-10T00:44:02.119789327Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\"" May 10 00:44:03.721767 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1675565916.mount: Deactivated successfully. May 10 00:44:05.988205 env[1184]: time="2025-05-10T00:44:05.988125713Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:05.990541 env[1184]: time="2025-05-10T00:44:05.990474221Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:05.994032 env[1184]: time="2025-05-10T00:44:05.993957948Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:05.997942 env[1184]: time="2025-05-10T00:44:05.997876615Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:4878682f7a044274d42399a6316ef452c5411aafd4ad99cc57de7235ca490e4e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:05.999824 env[1184]: time="2025-05-10T00:44:05.999705439Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\" returns image reference \"sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb\"" May 10 00:44:06.020294 env[1184]: time="2025-05-10T00:44:06.020250990Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\"" May 10 00:44:09.114985 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 10 00:44:09.123271 kernel: kauditd_printk_skb: 85 callbacks suppressed May 10 00:44:09.123319 kernel: audit: type=1130 audit(1746837849.114:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:09.123344 kernel: audit: type=1131 audit(1746837849.114:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:09.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:09.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:09.115278 systemd[1]: Stopped kubelet.service. May 10 00:44:09.115365 systemd[1]: kubelet.service: Consumed 1.453s CPU time. May 10 00:44:09.119753 systemd[1]: Starting kubelet.service... May 10 00:44:09.264158 env[1184]: time="2025-05-10T00:44:09.263599190Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:09.266452 env[1184]: time="2025-05-10T00:44:09.266384987Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:09.269714 env[1184]: time="2025-05-10T00:44:09.269661516Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:09.282954 env[1184]: time="2025-05-10T00:44:09.282877738Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:3a36711d0409d565b370a18d0c19339e93d4f1b1f2b3fd382eb31c714c463b74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:09.283881 env[1184]: time="2025-05-10T00:44:09.283800453Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\" returns image reference \"sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8\"" May 10 00:44:09.300826 kernel: audit: type=1130 audit(1746837849.296:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:09.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:09.296468 systemd[1]: Started kubelet.service. May 10 00:44:09.312056 env[1184]: time="2025-05-10T00:44:09.312008601Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\"" May 10 00:44:09.401202 kubelet[1496]: E0510 00:44:09.400188 1496 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:44:09.407065 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:44:09.407222 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:44:09.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:44:09.411818 kernel: audit: type=1131 audit(1746837849.406:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:44:11.793381 env[1184]: time="2025-05-10T00:44:11.793286766Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:11.796201 env[1184]: time="2025-05-10T00:44:11.796136110Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:11.801460 env[1184]: time="2025-05-10T00:44:11.799829319Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:11.804878 env[1184]: time="2025-05-10T00:44:11.804135737Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:521c843d01025be7d4e246ddee8cde74556eb9813c606d6db9f0f03236f6d029,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:11.805988 env[1184]: time="2025-05-10T00:44:11.805888605Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\" returns image reference \"sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d\"" May 10 00:44:11.834660 env[1184]: time="2025-05-10T00:44:11.834487623Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 10 00:44:14.034703 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1640228632.mount: Deactivated successfully. May 10 00:44:14.980987 env[1184]: time="2025-05-10T00:44:14.980912666Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:14.989529 env[1184]: time="2025-05-10T00:44:14.989461308Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:14.991938 env[1184]: time="2025-05-10T00:44:14.991880780Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:14.993208 env[1184]: time="2025-05-10T00:44:14.993155507Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:14.993989 env[1184]: time="2025-05-10T00:44:14.993932662Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b\"" May 10 00:44:15.014919 env[1184]: time="2025-05-10T00:44:15.014857674Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 10 00:44:16.489076 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2225772128.mount: Deactivated successfully. May 10 00:44:17.829789 env[1184]: time="2025-05-10T00:44:17.829710799Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:17.832090 env[1184]: time="2025-05-10T00:44:17.832032297Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:17.835283 env[1184]: time="2025-05-10T00:44:17.835203324Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:17.838144 env[1184]: time="2025-05-10T00:44:17.838075354Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:17.840197 env[1184]: time="2025-05-10T00:44:17.840121238Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 10 00:44:17.855531 env[1184]: time="2025-05-10T00:44:17.855480436Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" May 10 00:44:19.305524 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2891585551.mount: Deactivated successfully. May 10 00:44:19.312201 env[1184]: time="2025-05-10T00:44:19.312130045Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:19.314449 env[1184]: time="2025-05-10T00:44:19.314388655Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:19.316444 env[1184]: time="2025-05-10T00:44:19.316383666Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:19.318337 env[1184]: time="2025-05-10T00:44:19.318281358Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:19.319280 env[1184]: time="2025-05-10T00:44:19.319238564Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" May 10 00:44:19.345851 env[1184]: time="2025-05-10T00:44:19.345772365Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" May 10 00:44:19.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:19.614590 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 10 00:44:19.614908 systemd[1]: Stopped kubelet.service. May 10 00:44:19.617452 systemd[1]: Starting kubelet.service... May 10 00:44:19.623182 kernel: audit: type=1130 audit(1746837859.614:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:19.623369 kernel: audit: type=1131 audit(1746837859.614:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:19.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:19.756140 systemd[1]: Started kubelet.service. May 10 00:44:19.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:19.760791 kernel: audit: type=1130 audit(1746837859.756:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:19.845292 kubelet[1530]: E0510 00:44:19.845193 1530 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:44:19.848651 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:44:19.848914 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:44:19.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:44:19.853057 kernel: audit: type=1131 audit(1746837859.848:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:44:20.812190 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2283635962.mount: Deactivated successfully. May 10 00:44:24.002439 env[1184]: time="2025-05-10T00:44:24.002359373Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:24.005676 env[1184]: time="2025-05-10T00:44:24.005477167Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:24.009601 env[1184]: time="2025-05-10T00:44:24.009526725Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:24.013189 env[1184]: time="2025-05-10T00:44:24.013040295Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:24.016073 env[1184]: time="2025-05-10T00:44:24.015977014Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" May 10 00:44:27.245434 systemd[1]: Stopped kubelet.service. May 10 00:44:27.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.250426 systemd[1]: Starting kubelet.service... May 10 00:44:27.251809 kernel: audit: type=1130 audit(1746837867.245:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.264161 kernel: audit: type=1131 audit(1746837867.245:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.298209 systemd[1]: Reloading. May 10 00:44:27.501149 /usr/lib/systemd/system-generators/torcx-generator[1624]: time="2025-05-10T00:44:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:44:27.501200 /usr/lib/systemd/system-generators/torcx-generator[1624]: time="2025-05-10T00:44:27Z" level=info msg="torcx already run" May 10 00:44:27.701589 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:44:27.701623 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:44:27.736765 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:44:27.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.863717 kernel: audit: type=1400 audit(1746837867.858:261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.917598 kernel: audit: type=1400 audit(1746837867.863:262): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.917879 kernel: audit: type=1400 audit(1746837867.863:263): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.933225 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:44:27.933452 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 10 00:44:27.933523 kernel: audit: backlog limit exceeded May 10 00:44:27.933568 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:44:27.933597 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 May 10 00:44:27.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.916000 audit: BPF prog-id=40 op=LOAD May 10 00:44:27.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.917000 audit: BPF prog-id=41 op=LOAD May 10 00:44:27.917000 audit: BPF prog-id=24 op=UNLOAD May 10 00:44:27.917000 audit: BPF prog-id=25 op=UNLOAD May 10 00:44:27.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit: BPF prog-id=42 op=LOAD May 10 00:44:27.919000 audit: BPF prog-id=26 op=UNLOAD May 10 00:44:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit: BPF prog-id=43 op=LOAD May 10 00:44:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.919000 audit: BPF prog-id=44 op=LOAD May 10 00:44:27.919000 audit: BPF prog-id=27 op=UNLOAD May 10 00:44:27.919000 audit: BPF prog-id=28 op=UNLOAD May 10 00:44:27.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.922000 audit: BPF prog-id=45 op=LOAD May 10 00:44:27.922000 audit: BPF prog-id=34 op=UNLOAD May 10 00:44:27.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.936000 audit: BPF prog-id=47 op=LOAD May 10 00:44:27.936000 audit: BPF prog-id=30 op=UNLOAD May 10 00:44:27.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.937000 audit: BPF prog-id=31 op=UNLOAD May 10 00:44:27.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.943000 audit: BPF prog-id=50 op=LOAD May 10 00:44:27.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:27.947000 audit: BPF prog-id=54 op=LOAD May 10 00:44:27.947000 audit: BPF prog-id=38 op=UNLOAD May 10 00:44:27.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.977386 systemd[1]: Started kubelet.service. May 10 00:44:27.991473 systemd[1]: Stopping kubelet.service... May 10 00:44:27.992661 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:44:27.995402 systemd[1]: Stopped kubelet.service. May 10 00:44:27.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.999953 systemd[1]: Starting kubelet.service... May 10 00:44:28.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:28.145857 systemd[1]: Started kubelet.service. May 10 00:44:28.228750 kubelet[1682]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:44:28.228750 kubelet[1682]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 00:44:28.228750 kubelet[1682]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:44:28.229334 kubelet[1682]: I0510 00:44:28.228869 1682 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:44:28.487974 kubelet[1682]: I0510 00:44:28.487799 1682 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 10 00:44:28.487974 kubelet[1682]: I0510 00:44:28.487844 1682 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:44:28.490664 kubelet[1682]: I0510 00:44:28.488959 1682 server.go:927] "Client rotation is on, will bootstrap in background" May 10 00:44:28.522925 kubelet[1682]: I0510 00:44:28.522797 1682 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:44:28.524220 kubelet[1682]: E0510 00:44:28.524173 1682 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://143.198.48.176:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 143.198.48.176:6443: connect: connection refused May 10 00:44:28.542926 kubelet[1682]: I0510 00:44:28.542866 1682 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:44:28.549197 kubelet[1682]: I0510 00:44:28.548637 1682 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:44:28.549797 kubelet[1682]: I0510 00:44:28.549438 1682 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-3080830dac","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 10 00:44:28.550110 kubelet[1682]: I0510 00:44:28.550081 1682 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:44:28.550272 kubelet[1682]: I0510 00:44:28.550239 1682 container_manager_linux.go:301] "Creating device plugin manager" May 10 00:44:28.550618 kubelet[1682]: I0510 00:44:28.550593 1682 state_mem.go:36] "Initialized new in-memory state store" May 10 00:44:28.552796 kubelet[1682]: I0510 00:44:28.552146 1682 kubelet.go:400] "Attempting to sync node with API server" May 10 00:44:28.553000 kubelet[1682]: I0510 00:44:28.552972 1682 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:44:28.553868 kubelet[1682]: I0510 00:44:28.553145 1682 kubelet.go:312] "Adding apiserver pod source" May 10 00:44:28.553868 kubelet[1682]: I0510 00:44:28.553845 1682 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:44:28.563837 kubelet[1682]: W0510 00:44:28.552954 1682 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://143.198.48.176:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-3080830dac&limit=500&resourceVersion=0": dial tcp 143.198.48.176:6443: connect: connection refused May 10 00:44:28.563837 kubelet[1682]: E0510 00:44:28.562992 1682 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://143.198.48.176:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-3080830dac&limit=500&resourceVersion=0": dial tcp 143.198.48.176:6443: connect: connection refused May 10 00:44:28.564184 kubelet[1682]: I0510 00:44:28.564150 1682 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:44:28.566657 kubelet[1682]: I0510 00:44:28.566525 1682 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:44:28.566657 kubelet[1682]: W0510 00:44:28.566634 1682 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 10 00:44:28.568302 kubelet[1682]: I0510 00:44:28.567688 1682 server.go:1264] "Started kubelet" May 10 00:44:28.568302 kubelet[1682]: W0510 00:44:28.567957 1682 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://143.198.48.176:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 143.198.48.176:6443: connect: connection refused May 10 00:44:28.568302 kubelet[1682]: E0510 00:44:28.568032 1682 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://143.198.48.176:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 143.198.48.176:6443: connect: connection refused May 10 00:44:28.581476 kubelet[1682]: I0510 00:44:28.581365 1682 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:44:28.591786 kubelet[1682]: I0510 00:44:28.591715 1682 server.go:455] "Adding debug handlers to kubelet server" May 10 00:44:28.602454 kubelet[1682]: I0510 00:44:28.602333 1682 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:44:28.603174 kubelet[1682]: I0510 00:44:28.603130 1682 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:44:28.603000 audit[1682]: AVC avc: denied { mac_admin } for pid=1682 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:28.603000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:44:28.603000 audit[1682]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b0e3f0 a1=c0006baf18 a2=c000b0e3c0 a3=25 items=0 ppid=1 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:28.605196 kubelet[1682]: E0510 00:44:28.604845 1682 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://143.198.48.176:6443/api/v1/namespaces/default/events\": dial tcp 143.198.48.176:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.7-n-3080830dac.183e03c94c2ce3b4 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-3080830dac,UID:ci-3510.3.7-n-3080830dac,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-3080830dac,},FirstTimestamp:2025-05-10 00:44:28.567651252 +0000 UTC m=+0.411653440,LastTimestamp:2025-05-10 00:44:28.567651252 +0000 UTC m=+0.411653440,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-3080830dac,}" May 10 00:44:28.603000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:44:28.605562 kubelet[1682]: I0510 00:44:28.605505 1682 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:44:28.604000 audit[1682]: AVC avc: denied { mac_admin } for pid=1682 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:28.604000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:44:28.604000 audit[1682]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000740980 a1=c0006baf30 a2=c000b0e510 a3=25 items=0 ppid=1 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:28.604000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:44:28.607809 kubelet[1682]: I0510 00:44:28.607759 1682 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 00:44:28.608495 kubelet[1682]: I0510 00:44:28.608468 1682 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:44:28.613703 kubelet[1682]: E0510 00:44:28.613637 1682 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:44:28.614464 kubelet[1682]: E0510 00:44:28.614402 1682 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-3080830dac\" not found" May 10 00:44:28.614625 kubelet[1682]: I0510 00:44:28.614511 1682 volume_manager.go:291] "Starting Kubelet Volume Manager" May 10 00:44:28.614832 kubelet[1682]: I0510 00:44:28.614645 1682 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:44:28.614832 kubelet[1682]: I0510 00:44:28.614756 1682 reconciler.go:26] "Reconciler: start to sync state" May 10 00:44:28.615349 kubelet[1682]: W0510 00:44:28.615279 1682 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://143.198.48.176:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 143.198.48.176:6443: connect: connection refused May 10 00:44:28.615469 kubelet[1682]: E0510 00:44:28.615356 1682 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://143.198.48.176:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 143.198.48.176:6443: connect: connection refused May 10 00:44:28.615782 kubelet[1682]: E0510 00:44:28.615711 1682 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://143.198.48.176:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-3080830dac?timeout=10s\": dial tcp 143.198.48.176:6443: connect: connection refused" interval="200ms" May 10 00:44:28.616544 kubelet[1682]: I0510 00:44:28.616514 1682 factory.go:221] Registration of the systemd container factory successfully May 10 00:44:28.616700 kubelet[1682]: I0510 00:44:28.616675 1682 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:44:28.617000 audit[1692]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:28.617000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd23a377c0 a2=0 a3=7ffd23a377ac items=0 ppid=1682 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:28.617000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:44:28.618644 kubelet[1682]: I0510 00:44:28.618609 1682 factory.go:221] Registration of the containerd container factory successfully May 10 00:44:28.619000 audit[1693]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:28.619000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc0eed900 a2=0 a3=7ffdc0eed8ec items=0 ppid=1682 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:28.619000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:44:28.624000 audit[1696]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:28.624000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe51cc6a00 a2=0 a3=7ffe51cc69ec items=0 ppid=1682 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:28.624000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:44:28.635000 audit[1700]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:28.635000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe2f39a620 a2=0 a3=7ffe2f39a60c items=0 ppid=1682 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:28.635000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:44:28.638119 kubelet[1682]: I0510 00:44:28.638084 1682 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 00:44:28.638386 kubelet[1682]: I0510 00:44:28.638362 1682 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 00:44:28.638538 kubelet[1682]: I0510 00:44:28.638518 1682 state_mem.go:36] "Initialized new in-memory state store" May 10 00:44:28.640644 kubelet[1682]: I0510 00:44:28.640607 1682 policy_none.go:49] "None policy: Start" May 10 00:44:28.642354 kubelet[1682]: I0510 00:44:28.642321 1682 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 00:44:28.642555 kubelet[1682]: I0510 00:44:28.642536 1682 state_mem.go:35] "Initializing new in-memory state store" May 10 00:44:28.660591 systemd[1]: Created slice kubepods.slice. May 10 00:44:28.667000 audit[1705]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:28.667000 audit[1705]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd6c513db0 a2=0 a3=7ffd6c513d9c items=0 ppid=1682 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:28.667000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 10 00:44:28.668512 kubelet[1682]: I0510 00:44:28.668468 1682 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:44:28.670000 audit[1707]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:28.670000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb1edea10 a2=0 a3=7ffdb1ede9fc items=0 ppid=1682 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:28.670000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:44:28.671749 systemd[1]: Created slice kubepods-burstable.slice. May 10 00:44:28.671000 audit[1708]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:28.671000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc5c8d9c0 a2=0 a3=7ffdc5c8d9ac items=0 ppid=1682 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:28.671000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:44:28.674000 audit[1709]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:28.674000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1ea01910 a2=0 a3=7ffc1ea018fc items=0 ppid=1682 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:28.674000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:44:28.679139 systemd[1]: Created slice kubepods-besteffort.slice. May 10 00:44:28.679000 audit[1706]: NETFILTER_CFG table=mangle:34 family=10 entries=2 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:28.679000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc4f681bf0 a2=0 a3=7ffc4f681bdc items=0 ppid=1682 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:28.679000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:44:28.682226 kubelet[1682]: I0510 00:44:28.682043 1682 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:44:28.682226 kubelet[1682]: I0510 00:44:28.682088 1682 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 00:44:28.682226 kubelet[1682]: I0510 00:44:28.682113 1682 kubelet.go:2337] "Starting kubelet main sync loop" May 10 00:44:28.682503 kubelet[1682]: E0510 00:44:28.682217 1682 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:44:28.684418 kubelet[1682]: W0510 00:44:28.684353 1682 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://143.198.48.176:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 143.198.48.176:6443: connect: connection refused May 10 00:44:28.684659 kubelet[1682]: E0510 00:44:28.684625 1682 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://143.198.48.176:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 143.198.48.176:6443: connect: connection refused May 10 00:44:28.684000 audit[1710]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:28.684000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff95dec7b0 a2=0 a3=7fff95dec79c items=0 ppid=1682 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:28.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:44:28.687540 kubelet[1682]: I0510 00:44:28.687501 1682 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:44:28.686000 audit[1682]: AVC avc: denied { mac_admin } for pid=1682 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:28.686000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:44:28.687000 audit[1711]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:28.687000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff604725b0 a2=0 a3=7fff6047259c items=0 ppid=1682 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:28.687000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:44:28.686000 audit[1682]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dfaab0 a1=c000dff3e0 a2=c000dfaa80 a3=25 items=0 ppid=1 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:28.686000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:44:28.689327 kubelet[1682]: I0510 00:44:28.689150 1682 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:44:28.691672 kubelet[1682]: I0510 00:44:28.689371 1682 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:44:28.691672 kubelet[1682]: I0510 00:44:28.689548 1682 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:44:28.693292 kubelet[1682]: E0510 00:44:28.693245 1682 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.7-n-3080830dac\" not found" May 10 00:44:28.693000 audit[1712]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:28.693000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff40777890 a2=0 a3=7fff4077787c items=0 ppid=1682 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:28.693000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:44:28.717186 kubelet[1682]: I0510 00:44:28.717135 1682 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.7-n-3080830dac" May 10 00:44:28.718072 kubelet[1682]: E0510 00:44:28.718020 1682 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://143.198.48.176:6443/api/v1/nodes\": dial tcp 143.198.48.176:6443: connect: connection refused" node="ci-3510.3.7-n-3080830dac" May 10 00:44:28.788791 kubelet[1682]: I0510 00:44:28.788318 1682 topology_manager.go:215] "Topology Admit Handler" podUID="68447a90e1c83d8641539344ab09e3c5" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.7-n-3080830dac" May 10 00:44:28.796315 kubelet[1682]: I0510 00:44:28.796261 1682 topology_manager.go:215] "Topology Admit Handler" podUID="39301f2a8da3b11e344ffe2d7e4ee4e2" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.7-n-3080830dac" May 10 00:44:28.801118 kubelet[1682]: I0510 00:44:28.800373 1682 topology_manager.go:215] "Topology Admit Handler" podUID="aaf2a8fd4606edd68bd28ce24935d224" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.7-n-3080830dac" May 10 00:44:28.812926 systemd[1]: Created slice kubepods-burstable-pod68447a90e1c83d8641539344ab09e3c5.slice. May 10 00:44:28.816206 kubelet[1682]: I0510 00:44:28.816170 1682 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/aaf2a8fd4606edd68bd28ce24935d224-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-3080830dac\" (UID: \"aaf2a8fd4606edd68bd28ce24935d224\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-3080830dac" May 10 00:44:28.816469 kubelet[1682]: I0510 00:44:28.816437 1682 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/aaf2a8fd4606edd68bd28ce24935d224-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-3080830dac\" (UID: \"aaf2a8fd4606edd68bd28ce24935d224\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-3080830dac" May 10 00:44:28.816612 kubelet[1682]: I0510 00:44:28.816593 1682 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/68447a90e1c83d8641539344ab09e3c5-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-3080830dac\" (UID: \"68447a90e1c83d8641539344ab09e3c5\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-3080830dac" May 10 00:44:28.816701 kubelet[1682]: I0510 00:44:28.816684 1682 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/39301f2a8da3b11e344ffe2d7e4ee4e2-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-3080830dac\" (UID: \"39301f2a8da3b11e344ffe2d7e4ee4e2\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-3080830dac" May 10 00:44:28.816845 kubelet[1682]: E0510 00:44:28.816803 1682 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://143.198.48.176:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-3080830dac?timeout=10s\": dial tcp 143.198.48.176:6443: connect: connection refused" interval="400ms" May 10 00:44:28.816887 kubelet[1682]: I0510 00:44:28.816831 1682 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/39301f2a8da3b11e344ffe2d7e4ee4e2-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-3080830dac\" (UID: \"39301f2a8da3b11e344ffe2d7e4ee4e2\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-3080830dac" May 10 00:44:28.816934 kubelet[1682]: I0510 00:44:28.816909 1682 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/aaf2a8fd4606edd68bd28ce24935d224-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-3080830dac\" (UID: \"aaf2a8fd4606edd68bd28ce24935d224\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-3080830dac" May 10 00:44:28.816970 kubelet[1682]: I0510 00:44:28.816959 1682 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/aaf2a8fd4606edd68bd28ce24935d224-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-3080830dac\" (UID: \"aaf2a8fd4606edd68bd28ce24935d224\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-3080830dac" May 10 00:44:28.817023 kubelet[1682]: I0510 00:44:28.817001 1682 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/39301f2a8da3b11e344ffe2d7e4ee4e2-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-3080830dac\" (UID: \"39301f2a8da3b11e344ffe2d7e4ee4e2\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-3080830dac" May 10 00:44:28.817118 kubelet[1682]: I0510 00:44:28.817099 1682 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/aaf2a8fd4606edd68bd28ce24935d224-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-3080830dac\" (UID: \"aaf2a8fd4606edd68bd28ce24935d224\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-3080830dac" May 10 00:44:28.838652 systemd[1]: Created slice kubepods-burstable-pod39301f2a8da3b11e344ffe2d7e4ee4e2.slice. May 10 00:44:28.846915 systemd[1]: Created slice kubepods-burstable-podaaf2a8fd4606edd68bd28ce24935d224.slice. May 10 00:44:28.920523 kubelet[1682]: I0510 00:44:28.920476 1682 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.7-n-3080830dac" May 10 00:44:28.921104 kubelet[1682]: E0510 00:44:28.921065 1682 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://143.198.48.176:6443/api/v1/nodes\": dial tcp 143.198.48.176:6443: connect: connection refused" node="ci-3510.3.7-n-3080830dac" May 10 00:44:29.123921 kubelet[1682]: E0510 00:44:29.123862 1682 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:29.125890 env[1184]: time="2025-05-10T00:44:29.125346575Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-3080830dac,Uid:68447a90e1c83d8641539344ab09e3c5,Namespace:kube-system,Attempt:0,}" May 10 00:44:29.144623 kubelet[1682]: E0510 00:44:29.144559 1682 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:29.145758 env[1184]: time="2025-05-10T00:44:29.145688677Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-3080830dac,Uid:39301f2a8da3b11e344ffe2d7e4ee4e2,Namespace:kube-system,Attempt:0,}" May 10 00:44:29.155811 kubelet[1682]: E0510 00:44:29.155649 1682 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:29.156558 env[1184]: time="2025-05-10T00:44:29.156481829Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-3080830dac,Uid:aaf2a8fd4606edd68bd28ce24935d224,Namespace:kube-system,Attempt:0,}" May 10 00:44:29.217685 kubelet[1682]: E0510 00:44:29.217592 1682 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://143.198.48.176:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-3080830dac?timeout=10s\": dial tcp 143.198.48.176:6443: connect: connection refused" interval="800ms" May 10 00:44:29.323807 kubelet[1682]: I0510 00:44:29.323286 1682 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.7-n-3080830dac" May 10 00:44:29.323807 kubelet[1682]: E0510 00:44:29.323718 1682 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://143.198.48.176:6443/api/v1/nodes\": dial tcp 143.198.48.176:6443: connect: connection refused" node="ci-3510.3.7-n-3080830dac" May 10 00:44:29.937401 kubelet[1682]: W0510 00:44:29.937275 1682 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://143.198.48.176:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 143.198.48.176:6443: connect: connection refused May 10 00:44:29.937401 kubelet[1682]: E0510 00:44:29.937387 1682 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://143.198.48.176:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 143.198.48.176:6443: connect: connection refused May 10 00:44:29.956344 kubelet[1682]: W0510 00:44:29.956210 1682 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://143.198.48.176:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 143.198.48.176:6443: connect: connection refused May 10 00:44:29.956344 kubelet[1682]: E0510 00:44:29.956302 1682 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://143.198.48.176:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 143.198.48.176:6443: connect: connection refused May 10 00:44:30.000872 kubelet[1682]: W0510 00:44:30.000408 1682 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://143.198.48.176:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 143.198.48.176:6443: connect: connection refused May 10 00:44:30.000872 kubelet[1682]: E0510 00:44:30.000524 1682 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://143.198.48.176:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 143.198.48.176:6443: connect: connection refused May 10 00:44:30.019529 kubelet[1682]: E0510 00:44:30.019452 1682 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://143.198.48.176:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-3080830dac?timeout=10s\": dial tcp 143.198.48.176:6443: connect: connection refused" interval="1.6s" May 10 00:44:30.125802 kubelet[1682]: I0510 00:44:30.125638 1682 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.7-n-3080830dac" May 10 00:44:30.126320 kubelet[1682]: E0510 00:44:30.126263 1682 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://143.198.48.176:6443/api/v1/nodes\": dial tcp 143.198.48.176:6443: connect: connection refused" node="ci-3510.3.7-n-3080830dac" May 10 00:44:30.155601 kubelet[1682]: W0510 00:44:30.155500 1682 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://143.198.48.176:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-3080830dac&limit=500&resourceVersion=0": dial tcp 143.198.48.176:6443: connect: connection refused May 10 00:44:30.156006 kubelet[1682]: E0510 00:44:30.155955 1682 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://143.198.48.176:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-3080830dac&limit=500&resourceVersion=0": dial tcp 143.198.48.176:6443: connect: connection refused May 10 00:44:30.591913 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount975129279.mount: Deactivated successfully. May 10 00:44:30.598915 env[1184]: time="2025-05-10T00:44:30.598840541Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:30.604126 env[1184]: time="2025-05-10T00:44:30.604072686Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:30.606721 env[1184]: time="2025-05-10T00:44:30.606645819Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:30.608594 env[1184]: time="2025-05-10T00:44:30.608527615Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:30.610405 env[1184]: time="2025-05-10T00:44:30.610330107Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:30.611865 env[1184]: time="2025-05-10T00:44:30.611798452Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:30.616682 env[1184]: time="2025-05-10T00:44:30.616607180Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:30.623277 env[1184]: time="2025-05-10T00:44:30.623209730Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:30.629860 env[1184]: time="2025-05-10T00:44:30.628250095Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:30.644547 env[1184]: time="2025-05-10T00:44:30.644482413Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:30.646403 env[1184]: time="2025-05-10T00:44:30.646345043Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:30.648140 env[1184]: time="2025-05-10T00:44:30.648080646Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:30.690339 env[1184]: time="2025-05-10T00:44:30.689503643Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:30.690339 env[1184]: time="2025-05-10T00:44:30.689561664Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:30.690339 env[1184]: time="2025-05-10T00:44:30.689574445Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:30.690339 env[1184]: time="2025-05-10T00:44:30.689852438Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3fe9ec28d43fe0b30588b92e72e098ac171e4df9fc4985ca6653ed407d259a9c pid=1721 runtime=io.containerd.runc.v2 May 10 00:44:30.704035 env[1184]: time="2025-05-10T00:44:30.703914959Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:30.704523 env[1184]: time="2025-05-10T00:44:30.704443268Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:30.704746 env[1184]: time="2025-05-10T00:44:30.704688216Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:30.705205 env[1184]: time="2025-05-10T00:44:30.705144150Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/45d5d0ed34a7f7cc5cb08065642fab5198272605235d9be7d007764a4e1ea70f pid=1743 runtime=io.containerd.runc.v2 May 10 00:44:30.708367 env[1184]: time="2025-05-10T00:44:30.708216131Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:30.708367 env[1184]: time="2025-05-10T00:44:30.708294005Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:30.708367 env[1184]: time="2025-05-10T00:44:30.708311813Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:30.708765 env[1184]: time="2025-05-10T00:44:30.708535946Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c9251f18f2c801b8df3ba691d4c94ce2e4e0d8d99953db24880ef392c4e94250 pid=1752 runtime=io.containerd.runc.v2 May 10 00:44:30.723377 kubelet[1682]: E0510 00:44:30.723282 1682 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://143.198.48.176:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 143.198.48.176:6443: connect: connection refused May 10 00:44:30.740371 systemd[1]: Started cri-containerd-3fe9ec28d43fe0b30588b92e72e098ac171e4df9fc4985ca6653ed407d259a9c.scope. May 10 00:44:30.770321 systemd[1]: Started cri-containerd-c9251f18f2c801b8df3ba691d4c94ce2e4e0d8d99953db24880ef392c4e94250.scope. May 10 00:44:30.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.780000 audit: BPF prog-id=55 op=LOAD May 10 00:44:30.786707 systemd[1]: Started cri-containerd-45d5d0ed34a7f7cc5cb08065642fab5198272605235d9be7d007764a4e1ea70f.scope. May 10 00:44:30.787000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.787000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1721 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653965633238643433666530623330353838623932653732653039 May 10 00:44:30.788000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.788000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1721 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653965633238643433666530623330353838623932653732653039 May 10 00:44:30.788000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.788000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.788000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.788000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.788000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.788000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.788000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.788000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.788000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.788000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.788000 audit: BPF prog-id=56 op=LOAD May 10 00:44:30.788000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000205900 items=0 ppid=1721 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653965633238643433666530623330353838623932653732653039 May 10 00:44:30.796000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.796000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.796000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.796000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.796000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.796000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.796000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.796000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.796000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.796000 audit: BPF prog-id=57 op=LOAD May 10 00:44:30.796000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000205948 items=0 ppid=1721 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653965633238643433666530623330353838623932653732653039 May 10 00:44:30.798000 audit: BPF prog-id=57 op=UNLOAD May 10 00:44:30.798000 audit: BPF prog-id=56 op=UNLOAD May 10 00:44:30.798000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.798000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.798000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.798000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.798000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.798000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.798000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.798000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.798000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.798000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.798000 audit: BPF prog-id=58 op=LOAD May 10 00:44:30.798000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000205d58 items=0 ppid=1721 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653965633238643433666530623330353838623932653732653039 May 10 00:44:30.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.811000 audit: BPF prog-id=59 op=LOAD May 10 00:44:30.813000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.813000 audit[1774]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1752 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339323531663138663263383031623864663362613639316434633934 May 10 00:44:30.814000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.814000 audit[1774]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1752 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339323531663138663263383031623864663362613639316434633934 May 10 00:44:30.814000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.814000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.814000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.814000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.814000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.814000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.814000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.814000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.814000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.814000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.814000 audit: BPF prog-id=60 op=LOAD May 10 00:44:30.814000 audit[1774]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003007e0 items=0 ppid=1752 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339323531663138663263383031623864663362613639316434633934 May 10 00:44:30.816000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit: BPF prog-id=61 op=LOAD May 10 00:44:30.816000 audit[1774]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000300828 items=0 ppid=1752 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339323531663138663263383031623864663362613639316434633934 May 10 00:44:30.816000 audit: BPF prog-id=61 op=UNLOAD May 10 00:44:30.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit: BPF prog-id=62 op=LOAD May 10 00:44:30.816000 audit: BPF prog-id=60 op=UNLOAD May 10 00:44:30.816000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1743 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435643564306564333461376637636335636230383036353634326661 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1743 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435643564306564333461376637636335636230383036353634326661 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit: BPF prog-id=63 op=LOAD May 10 00:44:30.817000 audit[1759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003195b0 items=0 ppid=1743 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435643564306564333461376637636335636230383036353634326661 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit: BPF prog-id=64 op=LOAD May 10 00:44:30.817000 audit[1759]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003195f8 items=0 ppid=1743 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435643564306564333461376637636335636230383036353634326661 May 10 00:44:30.817000 audit: BPF prog-id=64 op=UNLOAD May 10 00:44:30.817000 audit: BPF prog-id=63 op=UNLOAD May 10 00:44:30.817000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.817000 audit: BPF prog-id=65 op=LOAD May 10 00:44:30.817000 audit[1759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000319a08 items=0 ppid=1743 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435643564306564333461376637636335636230383036353634326661 May 10 00:44:30.816000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.816000 audit: BPF prog-id=66 op=LOAD May 10 00:44:30.816000 audit[1774]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000300c38 items=0 ppid=1752 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339323531663138663263383031623864663362613639316434633934 May 10 00:44:30.890618 env[1184]: time="2025-05-10T00:44:30.890558688Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-3080830dac,Uid:39301f2a8da3b11e344ffe2d7e4ee4e2,Namespace:kube-system,Attempt:0,} returns sandbox id \"c9251f18f2c801b8df3ba691d4c94ce2e4e0d8d99953db24880ef392c4e94250\"" May 10 00:44:30.894150 kubelet[1682]: E0510 00:44:30.894091 1682 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:30.899618 env[1184]: time="2025-05-10T00:44:30.899561595Z" level=info msg="CreateContainer within sandbox \"c9251f18f2c801b8df3ba691d4c94ce2e4e0d8d99953db24880ef392c4e94250\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 10 00:44:30.919941 env[1184]: time="2025-05-10T00:44:30.918974065Z" level=info msg="CreateContainer within sandbox \"c9251f18f2c801b8df3ba691d4c94ce2e4e0d8d99953db24880ef392c4e94250\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"f503d03eb56bc33514a43a0ea084cb97d8f55c286a461ca2f9c4780ab444f17c\"" May 10 00:44:30.921204 env[1184]: time="2025-05-10T00:44:30.921148384Z" level=info msg="StartContainer for \"f503d03eb56bc33514a43a0ea084cb97d8f55c286a461ca2f9c4780ab444f17c\"" May 10 00:44:30.926920 env[1184]: time="2025-05-10T00:44:30.926849295Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-3080830dac,Uid:68447a90e1c83d8641539344ab09e3c5,Namespace:kube-system,Attempt:0,} returns sandbox id \"3fe9ec28d43fe0b30588b92e72e098ac171e4df9fc4985ca6653ed407d259a9c\"" May 10 00:44:30.928452 kubelet[1682]: E0510 00:44:30.928174 1682 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:30.929866 env[1184]: time="2025-05-10T00:44:30.929813109Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-3080830dac,Uid:aaf2a8fd4606edd68bd28ce24935d224,Namespace:kube-system,Attempt:0,} returns sandbox id \"45d5d0ed34a7f7cc5cb08065642fab5198272605235d9be7d007764a4e1ea70f\"" May 10 00:44:30.931331 env[1184]: time="2025-05-10T00:44:30.931274309Z" level=info msg="CreateContainer within sandbox \"3fe9ec28d43fe0b30588b92e72e098ac171e4df9fc4985ca6653ed407d259a9c\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 10 00:44:30.932401 kubelet[1682]: E0510 00:44:30.932360 1682 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:30.947035 env[1184]: time="2025-05-10T00:44:30.946925948Z" level=info msg="CreateContainer within sandbox \"45d5d0ed34a7f7cc5cb08065642fab5198272605235d9be7d007764a4e1ea70f\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 10 00:44:30.948692 env[1184]: time="2025-05-10T00:44:30.948627200Z" level=info msg="CreateContainer within sandbox \"3fe9ec28d43fe0b30588b92e72e098ac171e4df9fc4985ca6653ed407d259a9c\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"7604097fc100510b0580b4a388b5a14794825f69d0b8ece67cdd235c376d6880\"" May 10 00:44:30.949766 env[1184]: time="2025-05-10T00:44:30.949692100Z" level=info msg="StartContainer for \"7604097fc100510b0580b4a388b5a14794825f69d0b8ece67cdd235c376d6880\"" May 10 00:44:30.963382 env[1184]: time="2025-05-10T00:44:30.963172056Z" level=info msg="CreateContainer within sandbox \"45d5d0ed34a7f7cc5cb08065642fab5198272605235d9be7d007764a4e1ea70f\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"af5915527cbd3d2db0bca329298a9766181ea1324f2be4d1e02633529c6fc528\"" May 10 00:44:30.964277 env[1184]: time="2025-05-10T00:44:30.964231865Z" level=info msg="StartContainer for \"af5915527cbd3d2db0bca329298a9766181ea1324f2be4d1e02633529c6fc528\"" May 10 00:44:30.977188 systemd[1]: Started cri-containerd-f503d03eb56bc33514a43a0ea084cb97d8f55c286a461ca2f9c4780ab444f17c.scope. May 10 00:44:30.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:30.998000 audit: BPF prog-id=67 op=LOAD May 10 00:44:31.000000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.000000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1752 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635303364303365623536626333333531346134336130656130383463 May 10 00:44:31.001000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.001000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1752 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635303364303365623536626333333531346134336130656130383463 May 10 00:44:31.002000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.002000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.002000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.002000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.002000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.002000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.002000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.002000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.002000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.002000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.002000 audit: BPF prog-id=68 op=LOAD May 10 00:44:31.002000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001cc160 items=0 ppid=1752 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635303364303365623536626333333531346134336130656130383463 May 10 00:44:31.003000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.003000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.003000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.003000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.003000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.003000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.003000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.003000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.003000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.003000 audit: BPF prog-id=69 op=LOAD May 10 00:44:31.003000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001cc1a8 items=0 ppid=1752 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635303364303365623536626333333531346134336130656130383463 May 10 00:44:31.004000 audit: BPF prog-id=69 op=UNLOAD May 10 00:44:31.005000 audit: BPF prog-id=68 op=UNLOAD May 10 00:44:31.005000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.005000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.005000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.005000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.005000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.005000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.005000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.005000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.005000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.005000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.005000 audit: BPF prog-id=70 op=LOAD May 10 00:44:31.005000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001cc5b8 items=0 ppid=1752 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635303364303365623536626333333531346134336130656130383463 May 10 00:44:31.034946 systemd[1]: Started cri-containerd-af5915527cbd3d2db0bca329298a9766181ea1324f2be4d1e02633529c6fc528.scope. May 10 00:44:31.047037 systemd[1]: Started cri-containerd-7604097fc100510b0580b4a388b5a14794825f69d0b8ece67cdd235c376d6880.scope. May 10 00:44:31.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.090000 audit: BPF prog-id=71 op=LOAD May 10 00:44:31.092000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=1743 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353931353532376362643364326462306263613332393239386139 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=1743 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353931353532376362643364326462306263613332393239386139 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit: BPF prog-id=72 op=LOAD May 10 00:44:31.092000 audit[1868]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0002f7dc0 items=0 ppid=1743 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353931353532376362643364326462306263613332393239386139 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit: BPF prog-id=73 op=LOAD May 10 00:44:31.092000 audit[1868]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0002f7e08 items=0 ppid=1743 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353931353532376362643364326462306263613332393239386139 May 10 00:44:31.092000 audit: BPF prog-id=73 op=UNLOAD May 10 00:44:31.092000 audit: BPF prog-id=72 op=UNLOAD May 10 00:44:31.092000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.092000 audit: BPF prog-id=74 op=LOAD May 10 00:44:31.092000 audit[1868]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003d8218 items=0 ppid=1743 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353931353532376362643364326462306263613332393239386139 May 10 00:44:31.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.101000 audit: BPF prog-id=75 op=LOAD May 10 00:44:31.103000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.103000 audit[1871]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1721 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736303430393766633130303531306230353830623461333838623561 May 10 00:44:31.107000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.107000 audit[1871]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1721 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736303430393766633130303531306230353830623461333838623561 May 10 00:44:31.107000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.107000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.107000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.107000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.107000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.107000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.107000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.107000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.107000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.107000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.107000 audit: BPF prog-id=76 op=LOAD May 10 00:44:31.111275 env[1184]: time="2025-05-10T00:44:31.111130330Z" level=info msg="StartContainer for \"f503d03eb56bc33514a43a0ea084cb97d8f55c286a461ca2f9c4780ab444f17c\" returns successfully" May 10 00:44:31.107000 audit[1871]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001a6c70 items=0 ppid=1721 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736303430393766633130303531306230353830623461333838623561 May 10 00:44:31.111000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.111000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.111000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.111000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.111000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.111000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.111000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.111000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.111000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.111000 audit: BPF prog-id=77 op=LOAD May 10 00:44:31.111000 audit[1871]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001a6cb8 items=0 ppid=1721 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736303430393766633130303531306230353830623461333838623561 May 10 00:44:31.111000 audit: BPF prog-id=77 op=UNLOAD May 10 00:44:31.111000 audit: BPF prog-id=76 op=UNLOAD May 10 00:44:31.111000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.111000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.111000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.111000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.111000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.111000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.111000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.111000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.111000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.111000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:31.111000 audit: BPF prog-id=78 op=LOAD May 10 00:44:31.111000 audit[1871]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001a70c8 items=0 ppid=1721 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736303430393766633130303531306230353830623461333838623561 May 10 00:44:31.179905 env[1184]: time="2025-05-10T00:44:31.174185464Z" level=info msg="StartContainer for \"af5915527cbd3d2db0bca329298a9766181ea1324f2be4d1e02633529c6fc528\" returns successfully" May 10 00:44:31.190872 env[1184]: time="2025-05-10T00:44:31.190800102Z" level=info msg="StartContainer for \"7604097fc100510b0580b4a388b5a14794825f69d0b8ece67cdd235c376d6880\" returns successfully" May 10 00:44:31.620686 kubelet[1682]: E0510 00:44:31.620604 1682 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://143.198.48.176:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-3080830dac?timeout=10s\": dial tcp 143.198.48.176:6443: connect: connection refused" interval="3.2s" May 10 00:44:31.697269 kubelet[1682]: E0510 00:44:31.697235 1682 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:31.700562 kubelet[1682]: E0510 00:44:31.700519 1682 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:31.706666 kubelet[1682]: E0510 00:44:31.706617 1682 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:31.728107 kubelet[1682]: I0510 00:44:31.728070 1682 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.7-n-3080830dac" May 10 00:44:32.297388 kernel: kauditd_printk_skb: 691 callbacks suppressed May 10 00:44:32.297709 kernel: audit: type=1400 audit(1746837872.294:492): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:32.294000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:32.295000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:32.304501 kernel: audit: type=1400 audit(1746837872.295:493): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:32.295000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00091b960 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:44:32.313758 kernel: audit: type=1300 audit(1746837872.295:493): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00091b960 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:44:32.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:32.317778 kernel: audit: type=1327 audit(1746837872.295:493): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:32.294000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0009c8060 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:44:32.294000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:32.328434 kernel: audit: type=1300 audit(1746837872.294:492): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0009c8060 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:44:32.328628 kernel: audit: type=1327 audit(1746837872.294:492): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:32.705398 kubelet[1682]: E0510 00:44:32.705356 1682 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:33.606000 audit[1870]: AVC avc: denied { watch } for pid=1870 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:33.611766 kernel: audit: type=1400 audit(1746837873.606:494): avc: denied { watch } for pid=1870 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:33.612074 kernel: audit: type=1400 audit(1746837873.608:495): avc: denied { watch } for pid=1870 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:33.608000 audit[1870]: AVC avc: denied { watch } for pid=1870 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:33.608000 audit[1870]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c007926000 a2=fc6 a3=0 items=0 ppid=1752 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 key=(null) May 10 00:44:33.620781 kernel: audit: type=1300 audit(1746837873.608:495): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c007926000 a2=fc6 a3=0 items=0 ppid=1752 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 key=(null) May 10 00:44:33.620982 kernel: audit: type=1327 audit(1746837873.608:495): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134332E3139382E34382E313736002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 00:44:33.608000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134332E3139382E34382E313736002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 00:44:33.606000 audit[1870]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0041a8c60 a2=fc6 a3=0 items=0 ppid=1752 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 key=(null) May 10 00:44:33.606000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134332E3139382E34382E313736002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 00:44:33.626000 audit[1870]: AVC avc: denied { watch } for pid=1870 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:33.626000 audit[1870]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c006e4a660 a2=fc6 a3=0 items=0 ppid=1752 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 key=(null) May 10 00:44:33.626000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134332E3139382E34382E313736002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 00:44:33.628000 audit[1870]: AVC avc: denied { watch } for pid=1870 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:33.628000 audit[1870]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c007927ad0 a2=fc6 a3=0 items=0 ppid=1752 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 key=(null) May 10 00:44:33.628000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134332E3139382E34382E313736002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 00:44:33.673000 audit[1870]: AVC avc: denied { watch } for pid=1870 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:33.673000 audit[1870]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c004b1baa0 a2=fc6 a3=0 items=0 ppid=1752 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 key=(null) May 10 00:44:33.673000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134332E3139382E34382E313736002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 00:44:33.673000 audit[1870]: AVC avc: denied { watch } for pid=1870 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:33.673000 audit[1870]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c0078860c0 a2=fc6 a3=0 items=0 ppid=1752 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 key=(null) May 10 00:44:33.673000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134332E3139382E34382E313736002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 00:44:33.891417 kubelet[1682]: I0510 00:44:33.891354 1682 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.7-n-3080830dac" May 10 00:44:34.038921 kubelet[1682]: E0510 00:44:34.038870 1682 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.7-n-3080830dac\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.7-n-3080830dac" May 10 00:44:34.039721 kubelet[1682]: E0510 00:44:34.039693 1682 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:34.566340 kubelet[1682]: I0510 00:44:34.566285 1682 apiserver.go:52] "Watching apiserver" May 10 00:44:34.615693 kubelet[1682]: I0510 00:44:34.615639 1682 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:44:36.622382 systemd[1]: Reloading. May 10 00:44:36.772211 /usr/lib/systemd/system-generators/torcx-generator[1968]: time="2025-05-10T00:44:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:44:36.772257 /usr/lib/systemd/system-generators/torcx-generator[1968]: time="2025-05-10T00:44:36Z" level=info msg="torcx already run" May 10 00:44:36.951996 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:44:36.952344 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:44:36.984077 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:44:37.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.127000 audit: BPF prog-id=79 op=LOAD May 10 00:44:37.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.128000 audit: BPF prog-id=80 op=LOAD May 10 00:44:37.128000 audit: BPF prog-id=40 op=UNLOAD May 10 00:44:37.128000 audit: BPF prog-id=41 op=UNLOAD May 10 00:44:37.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.146000 audit: BPF prog-id=81 op=LOAD May 10 00:44:37.146000 audit: BPF prog-id=42 op=UNLOAD May 10 00:44:37.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.147000 audit: BPF prog-id=82 op=LOAD May 10 00:44:37.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.147000 audit: BPF prog-id=83 op=LOAD May 10 00:44:37.147000 audit: BPF prog-id=43 op=UNLOAD May 10 00:44:37.147000 audit: BPF prog-id=44 op=UNLOAD May 10 00:44:37.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.150000 audit: BPF prog-id=84 op=LOAD May 10 00:44:37.150000 audit: BPF prog-id=62 op=UNLOAD May 10 00:44:37.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.152000 audit: BPF prog-id=85 op=LOAD May 10 00:44:37.152000 audit: BPF prog-id=45 op=UNLOAD May 10 00:44:37.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.157000 audit: BPF prog-id=86 op=LOAD May 10 00:44:37.157000 audit: BPF prog-id=75 op=UNLOAD May 10 00:44:37.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.160000 audit: BPF prog-id=87 op=LOAD May 10 00:44:37.160000 audit: BPF prog-id=59 op=UNLOAD May 10 00:44:37.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.162000 audit: BPF prog-id=88 op=LOAD May 10 00:44:37.162000 audit: BPF prog-id=46 op=UNLOAD May 10 00:44:37.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.164000 audit: BPF prog-id=89 op=LOAD May 10 00:44:37.164000 audit: BPF prog-id=47 op=UNLOAD May 10 00:44:37.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.164000 audit: BPF prog-id=90 op=LOAD May 10 00:44:37.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.165000 audit: BPF prog-id=91 op=LOAD May 10 00:44:37.165000 audit: BPF prog-id=48 op=UNLOAD May 10 00:44:37.165000 audit: BPF prog-id=49 op=UNLOAD May 10 00:44:37.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.168000 audit: BPF prog-id=92 op=LOAD May 10 00:44:37.168000 audit: BPF prog-id=50 op=UNLOAD May 10 00:44:37.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.168000 audit: BPF prog-id=93 op=LOAD May 10 00:44:37.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.168000 audit: BPF prog-id=94 op=LOAD May 10 00:44:37.168000 audit: BPF prog-id=51 op=UNLOAD May 10 00:44:37.168000 audit: BPF prog-id=52 op=UNLOAD May 10 00:44:37.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.169000 audit: BPF prog-id=95 op=LOAD May 10 00:44:37.169000 audit: BPF prog-id=71 op=UNLOAD May 10 00:44:37.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.170000 audit: BPF prog-id=96 op=LOAD May 10 00:44:37.170000 audit: BPF prog-id=53 op=UNLOAD May 10 00:44:37.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.172000 audit: BPF prog-id=97 op=LOAD May 10 00:44:37.172000 audit: BPF prog-id=54 op=UNLOAD May 10 00:44:37.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.173000 audit: BPF prog-id=98 op=LOAD May 10 00:44:37.173000 audit: BPF prog-id=55 op=UNLOAD May 10 00:44:37.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.174000 audit: BPF prog-id=99 op=LOAD May 10 00:44:37.174000 audit: BPF prog-id=67 op=UNLOAD May 10 00:44:37.194194 systemd[1]: Stopping kubelet.service... May 10 00:44:37.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:37.214308 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:44:37.214583 systemd[1]: Stopped kubelet.service. May 10 00:44:37.218493 systemd[1]: Starting kubelet.service... May 10 00:44:38.372952 kernel: kauditd_printk_skb: 259 callbacks suppressed May 10 00:44:38.373201 kernel: audit: type=1400 audit(1746837878.367:745): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:38.367000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:38.367000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:38.377786 kernel: audit: type=1400 audit(1746837878.367:746): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:38.367000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f70380 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:44:38.367000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:38.386695 kernel: audit: type=1300 audit(1746837878.367:746): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f70380 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:44:38.386926 kernel: audit: type=1327 audit(1746837878.367:746): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:38.386968 kernel: audit: type=1400 audit(1746837878.368:747): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:38.368000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:38.368000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f703c0 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:44:38.394989 kernel: audit: type=1300 audit(1746837878.368:747): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f703c0 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:44:38.395182 kernel: audit: type=1327 audit(1746837878.368:747): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:38.368000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:38.402499 kernel: audit: type=1400 audit(1746837878.368:748): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:38.368000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:38.368000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f70400 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:44:38.413309 kernel: audit: type=1300 audit(1746837878.368:748): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f70400 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:44:38.413496 kernel: audit: type=1327 audit(1746837878.368:748): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:38.368000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:38.367000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000de0940 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:44:38.367000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:38.479772 systemd[1]: Started kubelet.service. May 10 00:44:38.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:38.620936 kubelet[2019]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:44:38.620936 kubelet[2019]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 00:44:38.620936 kubelet[2019]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:44:38.621642 kubelet[2019]: I0510 00:44:38.621001 2019 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:44:38.629880 kubelet[2019]: I0510 00:44:38.629175 2019 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 10 00:44:38.630091 kubelet[2019]: I0510 00:44:38.630061 2019 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:44:38.630565 kubelet[2019]: I0510 00:44:38.630536 2019 server.go:927] "Client rotation is on, will bootstrap in background" May 10 00:44:38.634100 kubelet[2019]: I0510 00:44:38.634065 2019 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 10 00:44:38.647710 kubelet[2019]: I0510 00:44:38.647650 2019 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:44:38.680981 kubelet[2019]: I0510 00:44:38.680860 2019 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:44:38.682373 kubelet[2019]: I0510 00:44:38.681230 2019 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:44:38.682597 kubelet[2019]: I0510 00:44:38.682377 2019 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-3080830dac","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 10 00:44:38.682793 kubelet[2019]: I0510 00:44:38.682602 2019 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:44:38.682793 kubelet[2019]: I0510 00:44:38.682615 2019 container_manager_linux.go:301] "Creating device plugin manager" May 10 00:44:38.693572 kubelet[2019]: I0510 00:44:38.693506 2019 state_mem.go:36] "Initialized new in-memory state store" May 10 00:44:38.693951 kubelet[2019]: I0510 00:44:38.693925 2019 kubelet.go:400] "Attempting to sync node with API server" May 10 00:44:38.694101 kubelet[2019]: I0510 00:44:38.693965 2019 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:44:38.694101 kubelet[2019]: I0510 00:44:38.693999 2019 kubelet.go:312] "Adding apiserver pod source" May 10 00:44:38.694933 kubelet[2019]: I0510 00:44:38.694894 2019 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:44:38.743701 kubelet[2019]: I0510 00:44:38.742887 2019 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:44:38.743701 kubelet[2019]: I0510 00:44:38.743141 2019 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:44:38.743701 kubelet[2019]: I0510 00:44:38.743706 2019 server.go:1264] "Started kubelet" May 10 00:44:38.745000 audit[2019]: AVC avc: denied { mac_admin } for pid=2019 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:38.745000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:44:38.745000 audit[2019]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000af8de0 a1=c000ab8b58 a2=c000af8db0 a3=25 items=0 ppid=1 pid=2019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:38.745000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:44:38.745000 audit[2019]: AVC avc: denied { mac_admin } for pid=2019 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:38.745000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:44:38.745000 audit[2019]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ad8460 a1=c000ab8b70 a2=c000af8e70 a3=25 items=0 ppid=1 pid=2019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:38.745000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:44:38.747244 kubelet[2019]: I0510 00:44:38.746370 2019 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:44:38.747244 kubelet[2019]: I0510 00:44:38.746426 2019 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 00:44:38.747244 kubelet[2019]: I0510 00:44:38.746459 2019 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:44:38.763613 kubelet[2019]: I0510 00:44:38.763507 2019 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:44:38.766441 kubelet[2019]: I0510 00:44:38.766390 2019 server.go:455] "Adding debug handlers to kubelet server" May 10 00:44:38.775915 kubelet[2019]: I0510 00:44:38.767515 2019 volume_manager.go:291] "Starting Kubelet Volume Manager" May 10 00:44:38.776413 kubelet[2019]: I0510 00:44:38.776332 2019 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:44:38.777025 kubelet[2019]: I0510 00:44:38.776990 2019 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:44:38.777525 kubelet[2019]: I0510 00:44:38.767537 2019 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:44:38.777904 kubelet[2019]: I0510 00:44:38.777878 2019 reconciler.go:26] "Reconciler: start to sync state" May 10 00:44:38.800696 kubelet[2019]: I0510 00:44:38.800626 2019 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:44:38.803236 kubelet[2019]: I0510 00:44:38.803183 2019 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:44:38.803508 kubelet[2019]: I0510 00:44:38.803487 2019 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 00:44:38.803712 kubelet[2019]: I0510 00:44:38.803694 2019 kubelet.go:2337] "Starting kubelet main sync loop" May 10 00:44:38.803958 kubelet[2019]: E0510 00:44:38.803926 2019 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:44:38.821356 kubelet[2019]: I0510 00:44:38.820053 2019 factory.go:221] Registration of the systemd container factory successfully May 10 00:44:38.821356 kubelet[2019]: I0510 00:44:38.820188 2019 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:44:38.851781 kubelet[2019]: E0510 00:44:38.849942 2019 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:44:38.852653 kubelet[2019]: I0510 00:44:38.852612 2019 factory.go:221] Registration of the containerd container factory successfully May 10 00:44:38.875576 kubelet[2019]: I0510 00:44:38.875524 2019 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.7-n-3080830dac" May 10 00:44:38.907476 kubelet[2019]: I0510 00:44:38.902637 2019 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510.3.7-n-3080830dac" May 10 00:44:38.907476 kubelet[2019]: I0510 00:44:38.902772 2019 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.7-n-3080830dac" May 10 00:44:38.907476 kubelet[2019]: E0510 00:44:38.905361 2019 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 10 00:44:38.991376 kubelet[2019]: I0510 00:44:38.990953 2019 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 00:44:38.991376 kubelet[2019]: I0510 00:44:38.990982 2019 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 00:44:38.991376 kubelet[2019]: I0510 00:44:38.991016 2019 state_mem.go:36] "Initialized new in-memory state store" May 10 00:44:38.991696 kubelet[2019]: I0510 00:44:38.991398 2019 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 10 00:44:38.991696 kubelet[2019]: I0510 00:44:38.991417 2019 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 10 00:44:38.991696 kubelet[2019]: I0510 00:44:38.991449 2019 policy_none.go:49] "None policy: Start" May 10 00:44:38.994338 kubelet[2019]: I0510 00:44:38.994298 2019 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 00:44:38.994574 kubelet[2019]: I0510 00:44:38.994552 2019 state_mem.go:35] "Initializing new in-memory state store" May 10 00:44:38.995062 kubelet[2019]: I0510 00:44:38.995029 2019 state_mem.go:75] "Updated machine memory state" May 10 00:44:39.006000 audit[2019]: AVC avc: denied { mac_admin } for pid=2019 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:39.006000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:44:39.006000 audit[2019]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005975c0 a1=c000903620 a2=c000597590 a3=25 items=0 ppid=1 pid=2019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:39.006000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:44:39.008085 kubelet[2019]: I0510 00:44:39.007339 2019 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:44:39.008085 kubelet[2019]: I0510 00:44:39.007446 2019 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:44:39.008085 kubelet[2019]: I0510 00:44:39.007719 2019 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:44:39.020991 kubelet[2019]: I0510 00:44:39.020145 2019 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:44:39.106071 kubelet[2019]: I0510 00:44:39.105934 2019 topology_manager.go:215] "Topology Admit Handler" podUID="68447a90e1c83d8641539344ab09e3c5" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.7-n-3080830dac" May 10 00:44:39.106302 kubelet[2019]: I0510 00:44:39.106125 2019 topology_manager.go:215] "Topology Admit Handler" podUID="39301f2a8da3b11e344ffe2d7e4ee4e2" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.7-n-3080830dac" May 10 00:44:39.106302 kubelet[2019]: I0510 00:44:39.106255 2019 topology_manager.go:215] "Topology Admit Handler" podUID="aaf2a8fd4606edd68bd28ce24935d224" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.7-n-3080830dac" May 10 00:44:39.116343 kubelet[2019]: W0510 00:44:39.116293 2019 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 00:44:39.119471 kubelet[2019]: W0510 00:44:39.119383 2019 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 00:44:39.121994 kubelet[2019]: W0510 00:44:39.121404 2019 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 00:44:39.181379 kubelet[2019]: I0510 00:44:39.181180 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/aaf2a8fd4606edd68bd28ce24935d224-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-3080830dac\" (UID: \"aaf2a8fd4606edd68bd28ce24935d224\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-3080830dac" May 10 00:44:39.181379 kubelet[2019]: I0510 00:44:39.181262 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/39301f2a8da3b11e344ffe2d7e4ee4e2-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-3080830dac\" (UID: \"39301f2a8da3b11e344ffe2d7e4ee4e2\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-3080830dac" May 10 00:44:39.181379 kubelet[2019]: I0510 00:44:39.181323 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/39301f2a8da3b11e344ffe2d7e4ee4e2-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-3080830dac\" (UID: \"39301f2a8da3b11e344ffe2d7e4ee4e2\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-3080830dac" May 10 00:44:39.181674 kubelet[2019]: I0510 00:44:39.181355 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/aaf2a8fd4606edd68bd28ce24935d224-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-3080830dac\" (UID: \"aaf2a8fd4606edd68bd28ce24935d224\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-3080830dac" May 10 00:44:39.181674 kubelet[2019]: I0510 00:44:39.181420 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/aaf2a8fd4606edd68bd28ce24935d224-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-3080830dac\" (UID: \"aaf2a8fd4606edd68bd28ce24935d224\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-3080830dac" May 10 00:44:39.181674 kubelet[2019]: I0510 00:44:39.181449 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/aaf2a8fd4606edd68bd28ce24935d224-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-3080830dac\" (UID: \"aaf2a8fd4606edd68bd28ce24935d224\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-3080830dac" May 10 00:44:39.181674 kubelet[2019]: I0510 00:44:39.181652 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/68447a90e1c83d8641539344ab09e3c5-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-3080830dac\" (UID: \"68447a90e1c83d8641539344ab09e3c5\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-3080830dac" May 10 00:44:39.181891 kubelet[2019]: I0510 00:44:39.181689 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/39301f2a8da3b11e344ffe2d7e4ee4e2-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-3080830dac\" (UID: \"39301f2a8da3b11e344ffe2d7e4ee4e2\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-3080830dac" May 10 00:44:39.181891 kubelet[2019]: I0510 00:44:39.181786 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/aaf2a8fd4606edd68bd28ce24935d224-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-3080830dac\" (UID: \"aaf2a8fd4606edd68bd28ce24935d224\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-3080830dac" May 10 00:44:39.418134 kubelet[2019]: E0510 00:44:39.418078 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:39.423320 kubelet[2019]: E0510 00:44:39.423235 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:39.423703 kubelet[2019]: E0510 00:44:39.423635 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:39.743308 kubelet[2019]: I0510 00:44:39.743073 2019 apiserver.go:52] "Watching apiserver" May 10 00:44:39.778565 kubelet[2019]: I0510 00:44:39.778507 2019 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:44:39.923406 kubelet[2019]: E0510 00:44:39.923367 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:39.924229 kubelet[2019]: E0510 00:44:39.924198 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:39.951785 kubelet[2019]: W0510 00:44:39.951744 2019 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 00:44:39.951985 kubelet[2019]: E0510 00:44:39.951825 2019 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.7-n-3080830dac\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.7-n-3080830dac" May 10 00:44:39.952467 kubelet[2019]: E0510 00:44:39.952436 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:40.003367 kubelet[2019]: I0510 00:44:40.003190 2019 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-3080830dac" podStartSLOduration=1.003152459 podStartE2EDuration="1.003152459s" podCreationTimestamp="2025-05-10 00:44:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:44:39.982302623 +0000 UTC m=+1.474454895" watchObservedRunningTime="2025-05-10 00:44:40.003152459 +0000 UTC m=+1.495304734" May 10 00:44:40.041395 kubelet[2019]: I0510 00:44:40.041257 2019 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.7-n-3080830dac" podStartSLOduration=1.041228052 podStartE2EDuration="1.041228052s" podCreationTimestamp="2025-05-10 00:44:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:44:40.004591902 +0000 UTC m=+1.496744175" watchObservedRunningTime="2025-05-10 00:44:40.041228052 +0000 UTC m=+1.533380325" May 10 00:44:40.077773 kubelet[2019]: I0510 00:44:40.077705 2019 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.7-n-3080830dac" podStartSLOduration=1.07767072 podStartE2EDuration="1.07767072s" podCreationTimestamp="2025-05-10 00:44:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:44:40.042236594 +0000 UTC m=+1.534388871" watchObservedRunningTime="2025-05-10 00:44:40.07767072 +0000 UTC m=+1.569822970" May 10 00:44:40.926393 kubelet[2019]: E0510 00:44:40.926342 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:41.211148 update_engine[1177]: I0510 00:44:41.210834 1177 update_attempter.cc:509] Updating boot flags... May 10 00:44:41.928427 kubelet[2019]: E0510 00:44:41.928383 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:44.995368 sudo[1327]: pam_unix(sudo:session): session closed for user root May 10 00:44:44.997459 kernel: kauditd_printk_skb: 15 callbacks suppressed May 10 00:44:44.997806 kernel: audit: type=1106 audit(1746837884.995:753): pid=1327 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:44.995000 audit[1327]: USER_END pid=1327 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:45.001023 kernel: audit: type=1104 audit(1746837884.996:754): pid=1327 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:44.996000 audit[1327]: CRED_DISP pid=1327 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:45.006417 sshd[1324]: pam_unix(sshd:session): session closed for user core May 10 00:44:45.008000 audit[1324]: USER_END pid=1324 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:44:45.012158 systemd[1]: sshd@6-143.198.48.176:22-139.178.68.195:49076.service: Deactivated successfully. May 10 00:44:45.013361 systemd[1]: session-7.scope: Deactivated successfully. May 10 00:44:45.014874 kernel: audit: type=1106 audit(1746837885.008:755): pid=1324 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:44:45.013578 systemd[1]: session-7.scope: Consumed 5.730s CPU time. May 10 00:44:45.008000 audit[1324]: CRED_DISP pid=1324 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:44:45.018870 systemd-logind[1176]: Session 7 logged out. Waiting for processes to exit. May 10 00:44:45.020333 kernel: audit: type=1104 audit(1746837885.008:756): pid=1324 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:44:45.020471 kernel: audit: type=1131 audit(1746837885.011:757): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-143.198.48.176:22-139.178.68.195:49076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:45.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-143.198.48.176:22-139.178.68.195:49076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:45.030963 systemd-logind[1176]: Removed session 7. May 10 00:44:47.084236 kubelet[2019]: E0510 00:44:47.084184 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:47.942438 kubelet[2019]: E0510 00:44:47.942386 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:48.389793 kubelet[2019]: E0510 00:44:48.389748 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:48.943767 kubelet[2019]: E0510 00:44:48.943689 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:49.443000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526945 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 10 00:44:49.449946 kernel: audit: type=1400 audit(1746837889.443:758): avc: denied { watch } for pid=1897 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526945 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 10 00:44:49.443000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b05d00 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:44:49.455782 kernel: audit: type=1300 audit(1746837889.443:758): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b05d00 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:44:49.443000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:49.460762 kernel: audit: type=1327 audit(1746837889.443:758): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:50.835720 kubelet[2019]: E0510 00:44:50.835663 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:51.099323 kubelet[2019]: I0510 00:44:51.099201 2019 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 10 00:44:51.100232 env[1184]: time="2025-05-10T00:44:51.100173284Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 10 00:44:51.100643 kubelet[2019]: I0510 00:44:51.100504 2019 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 10 00:44:51.905771 kubelet[2019]: I0510 00:44:51.905669 2019 topology_manager.go:215] "Topology Admit Handler" podUID="83437f18-a2a4-42de-9e60-33b79f281907" podNamespace="kube-system" podName="kube-proxy-7ms4l" May 10 00:44:51.912427 systemd[1]: Created slice kubepods-besteffort-pod83437f18_a2a4_42de_9e60_33b79f281907.slice. May 10 00:44:51.978488 kubelet[2019]: I0510 00:44:51.978438 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/83437f18-a2a4-42de-9e60-33b79f281907-kube-proxy\") pod \"kube-proxy-7ms4l\" (UID: \"83437f18-a2a4-42de-9e60-33b79f281907\") " pod="kube-system/kube-proxy-7ms4l" May 10 00:44:51.978895 kubelet[2019]: I0510 00:44:51.978848 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/83437f18-a2a4-42de-9e60-33b79f281907-xtables-lock\") pod \"kube-proxy-7ms4l\" (UID: \"83437f18-a2a4-42de-9e60-33b79f281907\") " pod="kube-system/kube-proxy-7ms4l" May 10 00:44:51.979292 kubelet[2019]: I0510 00:44:51.979246 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/83437f18-a2a4-42de-9e60-33b79f281907-lib-modules\") pod \"kube-proxy-7ms4l\" (UID: \"83437f18-a2a4-42de-9e60-33b79f281907\") " pod="kube-system/kube-proxy-7ms4l" May 10 00:44:51.979550 kubelet[2019]: I0510 00:44:51.979517 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p9b5h\" (UniqueName: \"kubernetes.io/projected/83437f18-a2a4-42de-9e60-33b79f281907-kube-api-access-p9b5h\") pod \"kube-proxy-7ms4l\" (UID: \"83437f18-a2a4-42de-9e60-33b79f281907\") " pod="kube-system/kube-proxy-7ms4l" May 10 00:44:52.206198 kubelet[2019]: I0510 00:44:52.206008 2019 topology_manager.go:215] "Topology Admit Handler" podUID="7f012205-d5c7-4f48-883f-51ca598c7265" podNamespace="tigera-operator" podName="tigera-operator-797db67f8-qqmgr" May 10 00:44:52.215215 systemd[1]: Created slice kubepods-besteffort-pod7f012205_d5c7_4f48_883f_51ca598c7265.slice. May 10 00:44:52.222335 kubelet[2019]: E0510 00:44:52.222287 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:52.224257 env[1184]: time="2025-05-10T00:44:52.223553743Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7ms4l,Uid:83437f18-a2a4-42de-9e60-33b79f281907,Namespace:kube-system,Attempt:0,}" May 10 00:44:52.255740 env[1184]: time="2025-05-10T00:44:52.255446547Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:52.255740 env[1184]: time="2025-05-10T00:44:52.255481972Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:52.255740 env[1184]: time="2025-05-10T00:44:52.255492437Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:52.257084 env[1184]: time="2025-05-10T00:44:52.256897518Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/661c308d384425f766eab047aa31fc12e9f90d9df2455d1f23be6bee1d7bf5ef pid=2116 runtime=io.containerd.runc.v2 May 10 00:44:52.285796 kubelet[2019]: I0510 00:44:52.281983 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7f012205-d5c7-4f48-883f-51ca598c7265-var-lib-calico\") pod \"tigera-operator-797db67f8-qqmgr\" (UID: \"7f012205-d5c7-4f48-883f-51ca598c7265\") " pod="tigera-operator/tigera-operator-797db67f8-qqmgr" May 10 00:44:52.285796 kubelet[2019]: I0510 00:44:52.282056 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5pqtv\" (UniqueName: \"kubernetes.io/projected/7f012205-d5c7-4f48-883f-51ca598c7265-kube-api-access-5pqtv\") pod \"tigera-operator-797db67f8-qqmgr\" (UID: \"7f012205-d5c7-4f48-883f-51ca598c7265\") " pod="tigera-operator/tigera-operator-797db67f8-qqmgr" May 10 00:44:52.320500 systemd[1]: Started cri-containerd-661c308d384425f766eab047aa31fc12e9f90d9df2455d1f23be6bee1d7bf5ef.scope. May 10 00:44:52.368313 kernel: audit: type=1400 audit(1746837892.360:759): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.368499 kernel: audit: type=1400 audit(1746837892.360:760): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.372761 kernel: audit: type=1400 audit(1746837892.360:761): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.375754 kernel: audit: type=1400 audit(1746837892.360:762): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.381848 kernel: audit: type=1400 audit(1746837892.360:763): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.382025 kernel: audit: type=1400 audit(1746837892.360:764): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.382079 kernel: audit: type=1400 audit(1746837892.360:765): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.388759 kernel: audit: type=1400 audit(1746837892.360:766): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.392908 kernel: audit: type=1400 audit(1746837892.360:767): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.397869 kernel: audit: type=1400 audit(1746837892.367:768): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit: BPF prog-id=100 op=LOAD May 10 00:44:52.367000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2116 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636316333303864333834343235663736366561623034376161333166 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2116 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636316333303864333834343235663736366561623034376161333166 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit: BPF prog-id=101 op=LOAD May 10 00:44:52.367000 audit[2127]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002cdcd0 items=0 ppid=2116 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636316333303864333834343235663736366561623034376161333166 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit: BPF prog-id=102 op=LOAD May 10 00:44:52.367000 audit[2127]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002cdd18 items=0 ppid=2116 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636316333303864333834343235663736366561623034376161333166 May 10 00:44:52.367000 audit: BPF prog-id=102 op=UNLOAD May 10 00:44:52.367000 audit: BPF prog-id=101 op=UNLOAD May 10 00:44:52.367000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { perfmon } for pid=2127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit[2127]: AVC avc: denied { bpf } for pid=2127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.367000 audit: BPF prog-id=103 op=LOAD May 10 00:44:52.367000 audit[2127]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00033a128 items=0 ppid=2116 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636316333303864333834343235663736366561623034376161333166 May 10 00:44:52.418472 env[1184]: time="2025-05-10T00:44:52.418406712Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7ms4l,Uid:83437f18-a2a4-42de-9e60-33b79f281907,Namespace:kube-system,Attempt:0,} returns sandbox id \"661c308d384425f766eab047aa31fc12e9f90d9df2455d1f23be6bee1d7bf5ef\"" May 10 00:44:52.421504 kubelet[2019]: E0510 00:44:52.421470 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:52.430606 env[1184]: time="2025-05-10T00:44:52.430542692Z" level=info msg="CreateContainer within sandbox \"661c308d384425f766eab047aa31fc12e9f90d9df2455d1f23be6bee1d7bf5ef\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 10 00:44:52.464431 env[1184]: time="2025-05-10T00:44:52.464287841Z" level=info msg="CreateContainer within sandbox \"661c308d384425f766eab047aa31fc12e9f90d9df2455d1f23be6bee1d7bf5ef\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c1dbddc19351eb1a2604dccfd9682df6467592b34763bc2297e7f29cc898eada\"" May 10 00:44:52.468858 env[1184]: time="2025-05-10T00:44:52.468758571Z" level=info msg="StartContainer for \"c1dbddc19351eb1a2604dccfd9682df6467592b34763bc2297e7f29cc898eada\"" May 10 00:44:52.495274 systemd[1]: Started cri-containerd-c1dbddc19351eb1a2604dccfd9682df6467592b34763bc2297e7f29cc898eada.scope. May 10 00:44:52.520000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f4d40337578 items=0 ppid=2116 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331646264646331393335316562316132363034646363666439363832 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit: BPF prog-id=104 op=LOAD May 10 00:44:52.520000 audit[2159]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000324b18 items=0 ppid=2116 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331646264646331393335316562316132363034646363666439363832 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit: BPF prog-id=105 op=LOAD May 10 00:44:52.520000 audit[2159]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000324b68 items=0 ppid=2116 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331646264646331393335316562316132363034646363666439363832 May 10 00:44:52.520000 audit: BPF prog-id=105 op=UNLOAD May 10 00:44:52.520000 audit: BPF prog-id=104 op=UNLOAD May 10 00:44:52.520000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.520000 audit: BPF prog-id=106 op=LOAD May 10 00:44:52.520000 audit[2159]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000324bf8 items=0 ppid=2116 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331646264646331393335316562316132363034646363666439363832 May 10 00:44:52.524664 env[1184]: time="2025-05-10T00:44:52.524365114Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-qqmgr,Uid:7f012205-d5c7-4f48-883f-51ca598c7265,Namespace:tigera-operator,Attempt:0,}" May 10 00:44:52.551628 env[1184]: time="2025-05-10T00:44:52.551562929Z" level=info msg="StartContainer for \"c1dbddc19351eb1a2604dccfd9682df6467592b34763bc2297e7f29cc898eada\" returns successfully" May 10 00:44:52.558406 env[1184]: time="2025-05-10T00:44:52.558265884Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:52.558406 env[1184]: time="2025-05-10T00:44:52.558337038Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:52.558406 env[1184]: time="2025-05-10T00:44:52.558353037Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:52.558916 env[1184]: time="2025-05-10T00:44:52.558624442Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2e215a282ea184a63250b5513a06d605a68bc65a608bb4b1fd59ec3454c1a461 pid=2190 runtime=io.containerd.runc.v2 May 10 00:44:52.585600 systemd[1]: Started cri-containerd-2e215a282ea184a63250b5513a06d605a68bc65a608bb4b1fd59ec3454c1a461.scope. May 10 00:44:52.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.609000 audit: BPF prog-id=107 op=LOAD May 10 00:44:52.611000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2190 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323135613238326561313834613633323530623535313361303664 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=2190 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323135613238326561313834613633323530623535313361303664 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit: BPF prog-id=108 op=LOAD May 10 00:44:52.611000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c00039cfb0 items=0 ppid=2190 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323135613238326561313834613633323530623535313361303664 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit: BPF prog-id=109 op=LOAD May 10 00:44:52.611000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c00039cff8 items=0 ppid=2190 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323135613238326561313834613633323530623535313361303664 May 10 00:44:52.611000 audit: BPF prog-id=109 op=UNLOAD May 10 00:44:52.611000 audit: BPF prog-id=108 op=UNLOAD May 10 00:44:52.611000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.611000 audit: BPF prog-id=110 op=LOAD May 10 00:44:52.611000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c00039d408 items=0 ppid=2190 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323135613238326561313834613633323530623535313361303664 May 10 00:44:52.662269 env[1184]: time="2025-05-10T00:44:52.662185271Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-qqmgr,Uid:7f012205-d5c7-4f48-883f-51ca598c7265,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"2e215a282ea184a63250b5513a06d605a68bc65a608bb4b1fd59ec3454c1a461\"" May 10 00:44:52.664996 env[1184]: time="2025-05-10T00:44:52.664947408Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 10 00:44:52.868000 audit[2253]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:52.868000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffcf6e7f80 a2=0 a3=7fffcf6e7f6c items=0 ppid=2170 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.868000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:44:52.874000 audit[2254]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:52.874000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff82c0ce30 a2=0 a3=7fff82c0ce1c items=0 ppid=2170 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.874000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:44:52.880000 audit[2256]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:52.880000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe52b70190 a2=0 a3=7ffe52b7017c items=0 ppid=2170 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.880000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:44:52.883000 audit[2257]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:52.883000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd6ab7ff0 a2=0 a3=7fffd6ab7fdc items=0 ppid=2170 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.883000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:44:52.884000 audit[2258]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:52.884000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc81a1df50 a2=0 a3=7ffc81a1df3c items=0 ppid=2170 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:44:52.885000 audit[2259]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:52.885000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb2185d80 a2=0 a3=7ffcb2185d6c items=0 ppid=2170 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.885000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:44:52.957997 kubelet[2019]: E0510 00:44:52.957941 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:52.975000 audit[2260]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:52.975000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc25efb2e0 a2=0 a3=7ffc25efb2cc items=0 ppid=2170 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.975000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:44:52.983000 audit[2262]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:52.983000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffda5c6a540 a2=0 a3=7ffda5c6a52c items=0 ppid=2170 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.983000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 10 00:44:52.994000 audit[2265]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:52.994000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd030a0b90 a2=0 a3=7ffd030a0b7c items=0 ppid=2170 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.994000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 10 00:44:52.996000 audit[2266]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:52.996000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe66b80200 a2=0 a3=7ffe66b801ec items=0 ppid=2170 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.996000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:44:53.002000 audit[2268]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:53.002000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff4e52b1a0 a2=0 a3=7fff4e52b18c items=0 ppid=2170 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:44:53.003000 audit[2269]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:53.003000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbdbb3630 a2=0 a3=7ffcbdbb361c items=0 ppid=2170 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.003000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:44:53.008000 audit[2271]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:53.008000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffee0353120 a2=0 a3=7ffee035310c items=0 ppid=2170 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:44:53.018000 audit[2274]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2274 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:53.018000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd1af35300 a2=0 a3=7ffd1af352ec items=0 ppid=2170 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.018000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 10 00:44:53.021000 audit[2275]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:53.021000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde965e350 a2=0 a3=7ffde965e33c items=0 ppid=2170 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.021000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:44:53.026000 audit[2277]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:53.026000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd07c422b0 a2=0 a3=7ffd07c4229c items=0 ppid=2170 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.026000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:44:53.029000 audit[2278]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:53.029000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc542cd1d0 a2=0 a3=7ffc542cd1bc items=0 ppid=2170 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.029000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:44:53.034000 audit[2280]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:53.034000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc4a7b6c90 a2=0 a3=7ffc4a7b6c7c items=0 ppid=2170 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.034000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:44:53.040000 audit[2283]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:53.040000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc701c8700 a2=0 a3=7ffc701c86ec items=0 ppid=2170 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.040000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:44:53.048000 audit[2286]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:53.048000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe50df1f30 a2=0 a3=7ffe50df1f1c items=0 ppid=2170 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.048000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:44:53.051000 audit[2287]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:53.051000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd20e668b0 a2=0 a3=7ffd20e6689c items=0 ppid=2170 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.051000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:44:53.058000 audit[2289]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:53.058000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffdb84f63c0 a2=0 a3=7ffdb84f63ac items=0 ppid=2170 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.058000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:44:53.065000 audit[2292]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:53.065000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe179c1870 a2=0 a3=7ffe179c185c items=0 ppid=2170 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.065000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:44:53.068000 audit[2293]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:53.068000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc12af33e0 a2=0 a3=7ffc12af33cc items=0 ppid=2170 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.068000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:44:53.074000 audit[2295]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:53.074000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd1e188eb0 a2=0 a3=7ffd1e188e9c items=0 ppid=2170 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.074000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:44:53.123000 audit[2301]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:53.123000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffd9be90710 a2=0 a3=7ffd9be906fc items=0 ppid=2170 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.123000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:53.138000 audit[2301]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:53.138000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffd9be90710 a2=0 a3=7ffd9be906fc items=0 ppid=2170 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.138000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:53.140000 audit[2306]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.140000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcad25fd40 a2=0 a3=7ffcad25fd2c items=0 ppid=2170 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.140000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:44:53.147000 audit[2308]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.147000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff6c6b8ab0 a2=0 a3=7fff6c6b8a9c items=0 ppid=2170 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.147000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 10 00:44:53.159000 audit[2311]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.159000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe034d42e0 a2=0 a3=7ffe034d42cc items=0 ppid=2170 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.159000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 10 00:44:53.162000 audit[2312]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.162000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd6b1d8f0 a2=0 a3=7ffdd6b1d8dc items=0 ppid=2170 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.162000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:44:53.166000 audit[2314]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.166000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc0cc1580 a2=0 a3=7ffcc0cc156c items=0 ppid=2170 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.166000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:44:53.168000 audit[2315]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.168000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed6193b70 a2=0 a3=7ffed6193b5c items=0 ppid=2170 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.168000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:44:53.172000 audit[2317]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.172000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeab2eb480 a2=0 a3=7ffeab2eb46c items=0 ppid=2170 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.172000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 10 00:44:53.178000 audit[2320]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.178000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcb7cbd5c0 a2=0 a3=7ffcb7cbd5ac items=0 ppid=2170 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.178000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:44:53.181000 audit[2321]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2321 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.181000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc39f6c0a0 a2=0 a3=7ffc39f6c08c items=0 ppid=2170 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.181000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:44:53.187000 audit[2323]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2323 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.187000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeefe50b60 a2=0 a3=7ffeefe50b4c items=0 ppid=2170 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.187000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:44:53.189000 audit[2324]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.189000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe5e1ddce0 a2=0 a3=7ffe5e1ddccc items=0 ppid=2170 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.189000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:44:53.195000 audit[2326]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.195000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd930dff70 a2=0 a3=7ffd930dff5c items=0 ppid=2170 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.195000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:44:53.201000 audit[2329]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2329 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.201000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc4007b240 a2=0 a3=7ffc4007b22c items=0 ppid=2170 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.201000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:44:53.207000 audit[2332]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.207000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff529a70c0 a2=0 a3=7fff529a70ac items=0 ppid=2170 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.207000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 10 00:44:53.210000 audit[2333]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.210000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdf3af2640 a2=0 a3=7ffdf3af262c items=0 ppid=2170 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.210000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:44:53.214000 audit[2335]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.214000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcfc0fbb10 a2=0 a3=7ffcfc0fbafc items=0 ppid=2170 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.214000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:44:53.221000 audit[2338]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.221000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd182bcb10 a2=0 a3=7ffd182bcafc items=0 ppid=2170 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.221000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:44:53.224000 audit[2339]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.224000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd313ab790 a2=0 a3=7ffd313ab77c items=0 ppid=2170 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.224000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:44:53.230000 audit[2341]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.230000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe7ec412e0 a2=0 a3=7ffe7ec412cc items=0 ppid=2170 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:44:53.233000 audit[2342]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2342 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.233000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcaadad1e0 a2=0 a3=7ffcaadad1cc items=0 ppid=2170 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.233000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:44:53.237000 audit[2344]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.237000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffde98b0850 a2=0 a3=7ffde98b083c items=0 ppid=2170 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.237000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:44:53.243000 audit[2347]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:53.243000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffec182e910 a2=0 a3=7ffec182e8fc items=0 ppid=2170 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.243000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:44:53.250000 audit[2349]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:44:53.250000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffd6d58d0d0 a2=0 a3=7ffd6d58d0bc items=0 ppid=2170 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.250000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:53.252000 audit[2349]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:44:53.252000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd6d58d0d0 a2=0 a3=7ffd6d58d0bc items=0 ppid=2170 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:53.252000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:53.984007 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount789082898.mount: Deactivated successfully. May 10 00:44:55.004526 env[1184]: time="2025-05-10T00:44:55.004342339Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:55.007995 env[1184]: time="2025-05-10T00:44:55.007921749Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:55.012034 env[1184]: time="2025-05-10T00:44:55.011953047Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:55.015650 env[1184]: time="2025-05-10T00:44:55.015572903Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:55.017967 env[1184]: time="2025-05-10T00:44:55.016891216Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 10 00:44:55.022307 env[1184]: time="2025-05-10T00:44:55.021686054Z" level=info msg="CreateContainer within sandbox \"2e215a282ea184a63250b5513a06d605a68bc65a608bb4b1fd59ec3454c1a461\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 10 00:44:55.068425 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2644545657.mount: Deactivated successfully. May 10 00:44:55.080857 env[1184]: time="2025-05-10T00:44:55.080775859Z" level=info msg="CreateContainer within sandbox \"2e215a282ea184a63250b5513a06d605a68bc65a608bb4b1fd59ec3454c1a461\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"6e66e78ab6475d398faffa84bc77234e8c67c8303cca6b249a1c21abe2c68391\"" May 10 00:44:55.080898 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2461934581.mount: Deactivated successfully. May 10 00:44:55.084103 env[1184]: time="2025-05-10T00:44:55.084044824Z" level=info msg="StartContainer for \"6e66e78ab6475d398faffa84bc77234e8c67c8303cca6b249a1c21abe2c68391\"" May 10 00:44:55.122939 systemd[1]: Started cri-containerd-6e66e78ab6475d398faffa84bc77234e8c67c8303cca6b249a1c21abe2c68391.scope. May 10 00:44:55.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.142000 audit: BPF prog-id=111 op=LOAD May 10 00:44:55.143000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.143000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2190 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:55.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665363665373861623634373564333938666166666138346263373732 May 10 00:44:55.143000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.143000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2190 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:55.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665363665373861623634373564333938666166666138346263373732 May 10 00:44:55.143000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.143000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.143000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.143000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.143000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.143000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.143000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.143000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.143000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.143000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.143000 audit: BPF prog-id=112 op=LOAD May 10 00:44:55.143000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028c7d0 items=0 ppid=2190 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:55.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665363665373861623634373564333938666166666138346263373732 May 10 00:44:55.143000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.143000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.143000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.143000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.143000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.143000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.143000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.143000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.143000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.143000 audit: BPF prog-id=113 op=LOAD May 10 00:44:55.143000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028c818 items=0 ppid=2190 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:55.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665363665373861623634373564333938666166666138346263373732 May 10 00:44:55.143000 audit: BPF prog-id=113 op=UNLOAD May 10 00:44:55.144000 audit: BPF prog-id=112 op=UNLOAD May 10 00:44:55.144000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.144000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.144000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.144000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.144000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.144000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.144000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.144000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.144000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.144000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:55.144000 audit: BPF prog-id=114 op=LOAD May 10 00:44:55.144000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028cc28 items=0 ppid=2190 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:55.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665363665373861623634373564333938666166666138346263373732 May 10 00:44:55.170804 env[1184]: time="2025-05-10T00:44:55.170216200Z" level=info msg="StartContainer for \"6e66e78ab6475d398faffa84bc77234e8c67c8303cca6b249a1c21abe2c68391\" returns successfully" May 10 00:44:55.984773 kubelet[2019]: I0510 00:44:55.984674 2019 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-7ms4l" podStartSLOduration=4.984640817 podStartE2EDuration="4.984640817s" podCreationTimestamp="2025-05-10 00:44:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:44:52.972470219 +0000 UTC m=+14.464622489" watchObservedRunningTime="2025-05-10 00:44:55.984640817 +0000 UTC m=+17.476793088" May 10 00:44:58.280773 kernel: kauditd_printk_skb: 357 callbacks suppressed May 10 00:44:58.281003 kernel: audit: type=1325 audit(1746837898.275:870): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:58.275000 audit[2390]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:58.275000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffccfad1c50 a2=0 a3=7ffccfad1c3c items=0 ppid=2170 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.288801 kernel: audit: type=1300 audit(1746837898.275:870): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffccfad1c50 a2=0 a3=7ffccfad1c3c items=0 ppid=2170 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.275000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:58.291755 kernel: audit: type=1327 audit(1746837898.275:870): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:58.294000 audit[2390]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:58.298821 kernel: audit: type=1325 audit(1746837898.294:871): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:58.294000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffccfad1c50 a2=0 a3=0 items=0 ppid=2170 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.304783 kernel: audit: type=1300 audit(1746837898.294:871): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffccfad1c50 a2=0 a3=0 items=0 ppid=2170 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.294000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:58.308787 kernel: audit: type=1327 audit(1746837898.294:871): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:58.343000 audit[2392]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:58.347022 kernel: audit: type=1325 audit(1746837898.343:872): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:58.343000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe48da6e60 a2=0 a3=7ffe48da6e4c items=0 ppid=2170 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.352857 kernel: audit: type=1300 audit(1746837898.343:872): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe48da6e60 a2=0 a3=7ffe48da6e4c items=0 ppid=2170 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.343000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:58.358572 kernel: audit: type=1327 audit(1746837898.343:872): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:58.358741 kernel: audit: type=1325 audit(1746837898.355:873): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:58.355000 audit[2392]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:58.355000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe48da6e60 a2=0 a3=0 items=0 ppid=2170 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.355000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:58.523409 kubelet[2019]: I0510 00:44:58.523323 2019 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-797db67f8-qqmgr" podStartSLOduration=4.167825282 podStartE2EDuration="6.523297669s" podCreationTimestamp="2025-05-10 00:44:52 +0000 UTC" firstStartedPulling="2025-05-10 00:44:52.66405634 +0000 UTC m=+14.156208591" lastFinishedPulling="2025-05-10 00:44:55.019528724 +0000 UTC m=+16.511680978" observedRunningTime="2025-05-10 00:44:55.988701897 +0000 UTC m=+17.480854170" watchObservedRunningTime="2025-05-10 00:44:58.523297669 +0000 UTC m=+20.015449944" May 10 00:44:58.525338 kubelet[2019]: I0510 00:44:58.525284 2019 topology_manager.go:215] "Topology Admit Handler" podUID="1f6b8640-3ed1-4dca-b108-f75211bc9650" podNamespace="calico-system" podName="calico-typha-868c956bd4-7kg2z" May 10 00:44:58.533449 systemd[1]: Created slice kubepods-besteffort-pod1f6b8640_3ed1_4dca_b108_f75211bc9650.slice. May 10 00:44:58.630586 kubelet[2019]: I0510 00:44:58.630529 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1f6b8640-3ed1-4dca-b108-f75211bc9650-tigera-ca-bundle\") pod \"calico-typha-868c956bd4-7kg2z\" (UID: \"1f6b8640-3ed1-4dca-b108-f75211bc9650\") " pod="calico-system/calico-typha-868c956bd4-7kg2z" May 10 00:44:58.630912 kubelet[2019]: I0510 00:44:58.630889 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5lqnp\" (UniqueName: \"kubernetes.io/projected/1f6b8640-3ed1-4dca-b108-f75211bc9650-kube-api-access-5lqnp\") pod \"calico-typha-868c956bd4-7kg2z\" (UID: \"1f6b8640-3ed1-4dca-b108-f75211bc9650\") " pod="calico-system/calico-typha-868c956bd4-7kg2z" May 10 00:44:58.631030 kubelet[2019]: I0510 00:44:58.631013 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/1f6b8640-3ed1-4dca-b108-f75211bc9650-typha-certs\") pod \"calico-typha-868c956bd4-7kg2z\" (UID: \"1f6b8640-3ed1-4dca-b108-f75211bc9650\") " pod="calico-system/calico-typha-868c956bd4-7kg2z" May 10 00:44:58.708385 kubelet[2019]: I0510 00:44:58.708332 2019 topology_manager.go:215] "Topology Admit Handler" podUID="43942b98-caa7-4cb8-b797-cad1334d7d29" podNamespace="calico-system" podName="calico-node-z2ft7" May 10 00:44:58.716851 systemd[1]: Created slice kubepods-besteffort-pod43942b98_caa7_4cb8_b797_cad1334d7d29.slice. May 10 00:44:58.731687 kubelet[2019]: I0510 00:44:58.731632 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/43942b98-caa7-4cb8-b797-cad1334d7d29-cni-bin-dir\") pod \"calico-node-z2ft7\" (UID: \"43942b98-caa7-4cb8-b797-cad1334d7d29\") " pod="calico-system/calico-node-z2ft7" May 10 00:44:58.732011 kubelet[2019]: I0510 00:44:58.731973 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/43942b98-caa7-4cb8-b797-cad1334d7d29-var-lib-calico\") pod \"calico-node-z2ft7\" (UID: \"43942b98-caa7-4cb8-b797-cad1334d7d29\") " pod="calico-system/calico-node-z2ft7" May 10 00:44:58.732241 kubelet[2019]: I0510 00:44:58.732217 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/43942b98-caa7-4cb8-b797-cad1334d7d29-xtables-lock\") pod \"calico-node-z2ft7\" (UID: \"43942b98-caa7-4cb8-b797-cad1334d7d29\") " pod="calico-system/calico-node-z2ft7" May 10 00:44:58.732405 kubelet[2019]: I0510 00:44:58.732379 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/43942b98-caa7-4cb8-b797-cad1334d7d29-policysync\") pod \"calico-node-z2ft7\" (UID: \"43942b98-caa7-4cb8-b797-cad1334d7d29\") " pod="calico-system/calico-node-z2ft7" May 10 00:44:58.732526 kubelet[2019]: I0510 00:44:58.732506 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/43942b98-caa7-4cb8-b797-cad1334d7d29-tigera-ca-bundle\") pod \"calico-node-z2ft7\" (UID: \"43942b98-caa7-4cb8-b797-cad1334d7d29\") " pod="calico-system/calico-node-z2ft7" May 10 00:44:58.732658 kubelet[2019]: I0510 00:44:58.732635 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/43942b98-caa7-4cb8-b797-cad1334d7d29-flexvol-driver-host\") pod \"calico-node-z2ft7\" (UID: \"43942b98-caa7-4cb8-b797-cad1334d7d29\") " pod="calico-system/calico-node-z2ft7" May 10 00:44:58.733017 kubelet[2019]: I0510 00:44:58.732987 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7rz4j\" (UniqueName: \"kubernetes.io/projected/43942b98-caa7-4cb8-b797-cad1334d7d29-kube-api-access-7rz4j\") pod \"calico-node-z2ft7\" (UID: \"43942b98-caa7-4cb8-b797-cad1334d7d29\") " pod="calico-system/calico-node-z2ft7" May 10 00:44:58.733282 kubelet[2019]: I0510 00:44:58.733255 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/43942b98-caa7-4cb8-b797-cad1334d7d29-cni-net-dir\") pod \"calico-node-z2ft7\" (UID: \"43942b98-caa7-4cb8-b797-cad1334d7d29\") " pod="calico-system/calico-node-z2ft7" May 10 00:44:58.736824 kubelet[2019]: I0510 00:44:58.736775 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/43942b98-caa7-4cb8-b797-cad1334d7d29-cni-log-dir\") pod \"calico-node-z2ft7\" (UID: \"43942b98-caa7-4cb8-b797-cad1334d7d29\") " pod="calico-system/calico-node-z2ft7" May 10 00:44:58.737146 kubelet[2019]: I0510 00:44:58.737121 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/43942b98-caa7-4cb8-b797-cad1334d7d29-lib-modules\") pod \"calico-node-z2ft7\" (UID: \"43942b98-caa7-4cb8-b797-cad1334d7d29\") " pod="calico-system/calico-node-z2ft7" May 10 00:44:58.737317 kubelet[2019]: I0510 00:44:58.737293 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/43942b98-caa7-4cb8-b797-cad1334d7d29-node-certs\") pod \"calico-node-z2ft7\" (UID: \"43942b98-caa7-4cb8-b797-cad1334d7d29\") " pod="calico-system/calico-node-z2ft7" May 10 00:44:58.737461 kubelet[2019]: I0510 00:44:58.737439 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/43942b98-caa7-4cb8-b797-cad1334d7d29-var-run-calico\") pod \"calico-node-z2ft7\" (UID: \"43942b98-caa7-4cb8-b797-cad1334d7d29\") " pod="calico-system/calico-node-z2ft7" May 10 00:44:58.838847 kubelet[2019]: E0510 00:44:58.837160 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:58.839908 env[1184]: time="2025-05-10T00:44:58.839328892Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-868c956bd4-7kg2z,Uid:1f6b8640-3ed1-4dca-b108-f75211bc9650,Namespace:calico-system,Attempt:0,}" May 10 00:44:58.845603 kubelet[2019]: E0510 00:44:58.845552 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:58.846044 kubelet[2019]: W0510 00:44:58.846008 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:58.846241 kubelet[2019]: E0510 00:44:58.846164 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:58.849134 kubelet[2019]: E0510 00:44:58.849018 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:58.849418 kubelet[2019]: W0510 00:44:58.849383 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:58.849987 kubelet[2019]: E0510 00:44:58.849951 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:58.871081 kubelet[2019]: E0510 00:44:58.871042 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:58.886808 kubelet[2019]: W0510 00:44:58.886756 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:58.887052 kubelet[2019]: E0510 00:44:58.887032 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:58.887570 kubelet[2019]: E0510 00:44:58.887497 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:58.887570 kubelet[2019]: W0510 00:44:58.887534 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:58.887570 kubelet[2019]: E0510 00:44:58.887565 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:58.887895 kubelet[2019]: E0510 00:44:58.887876 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:58.887958 kubelet[2019]: W0510 00:44:58.887895 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:58.887958 kubelet[2019]: E0510 00:44:58.887920 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:58.895400 kubelet[2019]: E0510 00:44:58.895348 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:58.895400 kubelet[2019]: W0510 00:44:58.895391 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:58.896765 kubelet[2019]: E0510 00:44:58.896713 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:58.897622 env[1184]: time="2025-05-10T00:44:58.897523089Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:58.897947 env[1184]: time="2025-05-10T00:44:58.897905559Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:58.898294 kubelet[2019]: E0510 00:44:58.898256 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:58.898294 kubelet[2019]: W0510 00:44:58.898288 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:58.898530 kubelet[2019]: E0510 00:44:58.898480 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:58.901857 env[1184]: time="2025-05-10T00:44:58.898086555Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:58.901857 env[1184]: time="2025-05-10T00:44:58.898982501Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b2998ff61c2fc2a4f7e424800f3dfcf36d084508918703020dba9c2617fb80bd pid=2406 runtime=io.containerd.runc.v2 May 10 00:44:58.902116 kubelet[2019]: E0510 00:44:58.901952 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:58.902116 kubelet[2019]: W0510 00:44:58.902016 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:58.902285 kubelet[2019]: E0510 00:44:58.902255 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:58.910435 kubelet[2019]: E0510 00:44:58.910385 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:58.910435 kubelet[2019]: W0510 00:44:58.910423 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:58.910897 kubelet[2019]: E0510 00:44:58.910813 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:58.919979 kubelet[2019]: E0510 00:44:58.919913 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:58.919979 kubelet[2019]: W0510 00:44:58.919957 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:58.920312 kubelet[2019]: E0510 00:44:58.920245 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:58.920407 kubelet[2019]: E0510 00:44:58.920331 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:58.920407 kubelet[2019]: W0510 00:44:58.920344 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:58.921132 kubelet[2019]: E0510 00:44:58.920557 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:58.921132 kubelet[2019]: E0510 00:44:58.920532 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:58.921132 kubelet[2019]: W0510 00:44:58.920580 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:58.921132 kubelet[2019]: E0510 00:44:58.920624 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:58.921132 kubelet[2019]: E0510 00:44:58.920943 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:58.921132 kubelet[2019]: W0510 00:44:58.920958 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:58.921132 kubelet[2019]: E0510 00:44:58.920973 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:58.923436 kubelet[2019]: E0510 00:44:58.923336 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:58.923436 kubelet[2019]: W0510 00:44:58.923368 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:58.923436 kubelet[2019]: E0510 00:44:58.923391 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:58.950763 systemd[1]: Started cri-containerd-b2998ff61c2fc2a4f7e424800f3dfcf36d084508918703020dba9c2617fb80bd.scope. May 10 00:44:59.020754 kubelet[2019]: E0510 00:44:59.020688 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:59.021596 env[1184]: time="2025-05-10T00:44:59.021546897Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-z2ft7,Uid:43942b98-caa7-4cb8-b797-cad1334d7d29,Namespace:calico-system,Attempt:0,}" May 10 00:44:59.026667 kubelet[2019]: I0510 00:44:59.026609 2019 topology_manager.go:215] "Topology Admit Handler" podUID="2b9a7249-2bd8-45a6-8253-10147c8c745b" podNamespace="calico-system" podName="csi-node-driver-84rrs" May 10 00:44:59.027186 kubelet[2019]: E0510 00:44:59.027133 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-84rrs" podUID="2b9a7249-2bd8-45a6-8253-10147c8c745b" May 10 00:44:59.061398 env[1184]: time="2025-05-10T00:44:59.061261386Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:59.061398 env[1184]: time="2025-05-10T00:44:59.061344739Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:59.061710 env[1184]: time="2025-05-10T00:44:59.061406794Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:59.061806 env[1184]: time="2025-05-10T00:44:59.061714772Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/799753e9d40197f7110033de92a8a275ea7f1919cd3b9d166d3a7b34ca2df890 pid=2453 runtime=io.containerd.runc.v2 May 10 00:44:59.082624 systemd[1]: Started cri-containerd-799753e9d40197f7110033de92a8a275ea7f1919cd3b9d166d3a7b34ca2df890.scope. May 10 00:44:59.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.119000 audit: BPF prog-id=115 op=LOAD May 10 00:44:59.120000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2406 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:59.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232393938666636316332666332613466376534323438303066336466 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2406 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:59.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232393938666636316332666332613466376534323438303066336466 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit: BPF prog-id=116 op=LOAD May 10 00:44:59.120000 audit[2425]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000dff80 items=0 ppid=2406 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:59.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232393938666636316332666332613466376534323438303066336466 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit: BPF prog-id=117 op=LOAD May 10 00:44:59.120000 audit[2425]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000dffc8 items=0 ppid=2406 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:59.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232393938666636316332666332613466376534323438303066336466 May 10 00:44:59.120000 audit: BPF prog-id=117 op=UNLOAD May 10 00:44:59.120000 audit: BPF prog-id=116 op=UNLOAD May 10 00:44:59.120000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.120000 audit: BPF prog-id=118 op=LOAD May 10 00:44:59.120000 audit[2425]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003e43d8 items=0 ppid=2406 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:59.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232393938666636316332666332613466376534323438303066336466 May 10 00:44:59.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.124000 audit: BPF prog-id=119 op=LOAD May 10 00:44:59.126000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.126000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2453 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:59.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739393735336539643430313937663731313030333364653932613861 May 10 00:44:59.126000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.126000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2453 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:59.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739393735336539643430313937663731313030333364653932613861 May 10 00:44:59.126000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.126000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.126000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.126000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.126000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.126000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.126000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.126000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.126000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.126000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.126000 audit: BPF prog-id=120 op=LOAD May 10 00:44:59.126000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000329d00 items=0 ppid=2453 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:59.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739393735336539643430313937663731313030333364653932613861 May 10 00:44:59.127000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.127000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.127000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.127000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.127000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.127000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.127000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.127000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.127000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.127000 audit: BPF prog-id=121 op=LOAD May 10 00:44:59.127000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000329d48 items=0 ppid=2453 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:59.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739393735336539643430313937663731313030333364653932613861 May 10 00:44:59.127000 audit: BPF prog-id=121 op=UNLOAD May 10 00:44:59.127000 audit: BPF prog-id=120 op=UNLOAD May 10 00:44:59.127000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.127000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.127000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.127000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.127000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.127000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.127000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.127000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.127000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.127000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:59.127000 audit: BPF prog-id=122 op=LOAD May 10 00:44:59.127000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000388158 items=0 ppid=2453 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:59.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739393735336539643430313937663731313030333364653932613861 May 10 00:44:59.136355 kubelet[2019]: E0510 00:44:59.126181 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.136355 kubelet[2019]: W0510 00:44:59.126206 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.136355 kubelet[2019]: E0510 00:44:59.126239 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.136355 kubelet[2019]: E0510 00:44:59.128509 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.136355 kubelet[2019]: W0510 00:44:59.128531 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.136355 kubelet[2019]: E0510 00:44:59.128557 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.136355 kubelet[2019]: E0510 00:44:59.128832 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.136355 kubelet[2019]: W0510 00:44:59.128840 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.136355 kubelet[2019]: E0510 00:44:59.128850 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.136355 kubelet[2019]: E0510 00:44:59.130514 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.136693 kubelet[2019]: W0510 00:44:59.130610 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.136693 kubelet[2019]: E0510 00:44:59.130630 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.136693 kubelet[2019]: E0510 00:44:59.132089 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.136693 kubelet[2019]: W0510 00:44:59.132107 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.136693 kubelet[2019]: E0510 00:44:59.132127 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.136693 kubelet[2019]: E0510 00:44:59.132636 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.136693 kubelet[2019]: W0510 00:44:59.132648 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.136693 kubelet[2019]: E0510 00:44:59.132662 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.136693 kubelet[2019]: E0510 00:44:59.132906 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.136693 kubelet[2019]: W0510 00:44:59.132916 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.137023 kubelet[2019]: E0510 00:44:59.132954 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.137559 kubelet[2019]: E0510 00:44:59.137143 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.137559 kubelet[2019]: W0510 00:44:59.137167 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.137559 kubelet[2019]: E0510 00:44:59.137191 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.137559 kubelet[2019]: E0510 00:44:59.137455 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.137559 kubelet[2019]: W0510 00:44:59.137463 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.137559 kubelet[2019]: E0510 00:44:59.137474 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.144584 kubelet[2019]: E0510 00:44:59.144122 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.144584 kubelet[2019]: W0510 00:44:59.144151 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.144584 kubelet[2019]: E0510 00:44:59.144177 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.145106 kubelet[2019]: E0510 00:44:59.144885 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.145106 kubelet[2019]: W0510 00:44:59.144902 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.145106 kubelet[2019]: E0510 00:44:59.144927 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.145922 kubelet[2019]: E0510 00:44:59.145289 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.145922 kubelet[2019]: W0510 00:44:59.145300 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.145922 kubelet[2019]: E0510 00:44:59.145312 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.145922 kubelet[2019]: E0510 00:44:59.145750 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.145922 kubelet[2019]: W0510 00:44:59.145762 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.145922 kubelet[2019]: E0510 00:44:59.145777 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.146492 kubelet[2019]: E0510 00:44:59.146367 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.146492 kubelet[2019]: W0510 00:44:59.146382 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.146492 kubelet[2019]: E0510 00:44:59.146393 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.152973 kubelet[2019]: E0510 00:44:59.147615 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.152973 kubelet[2019]: W0510 00:44:59.147630 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.152973 kubelet[2019]: E0510 00:44:59.147643 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.152973 kubelet[2019]: E0510 00:44:59.147826 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.152973 kubelet[2019]: W0510 00:44:59.147833 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.152973 kubelet[2019]: E0510 00:44:59.147842 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.152973 kubelet[2019]: E0510 00:44:59.148049 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.152973 kubelet[2019]: W0510 00:44:59.148058 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.152973 kubelet[2019]: E0510 00:44:59.148067 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.152973 kubelet[2019]: E0510 00:44:59.148206 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.153381 kubelet[2019]: W0510 00:44:59.148213 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.153381 kubelet[2019]: E0510 00:44:59.148222 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.153381 kubelet[2019]: E0510 00:44:59.148345 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.153381 kubelet[2019]: W0510 00:44:59.148351 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.153381 kubelet[2019]: E0510 00:44:59.148358 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.153381 kubelet[2019]: E0510 00:44:59.148488 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.153381 kubelet[2019]: W0510 00:44:59.148495 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.153381 kubelet[2019]: E0510 00:44:59.148502 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.153381 kubelet[2019]: E0510 00:44:59.148795 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.153381 kubelet[2019]: W0510 00:44:59.148804 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.153816 kubelet[2019]: E0510 00:44:59.148813 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.153816 kubelet[2019]: I0510 00:44:59.148843 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/2b9a7249-2bd8-45a6-8253-10147c8c745b-varrun\") pod \"csi-node-driver-84rrs\" (UID: \"2b9a7249-2bd8-45a6-8253-10147c8c745b\") " pod="calico-system/csi-node-driver-84rrs" May 10 00:44:59.153816 kubelet[2019]: E0510 00:44:59.149052 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.153816 kubelet[2019]: W0510 00:44:59.149062 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.153816 kubelet[2019]: E0510 00:44:59.149079 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.153816 kubelet[2019]: I0510 00:44:59.149095 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/2b9a7249-2bd8-45a6-8253-10147c8c745b-registration-dir\") pod \"csi-node-driver-84rrs\" (UID: \"2b9a7249-2bd8-45a6-8253-10147c8c745b\") " pod="calico-system/csi-node-driver-84rrs" May 10 00:44:59.153816 kubelet[2019]: E0510 00:44:59.153089 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.153816 kubelet[2019]: W0510 00:44:59.153129 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.153816 kubelet[2019]: E0510 00:44:59.153178 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.154914 kubelet[2019]: E0510 00:44:59.154866 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.154914 kubelet[2019]: W0510 00:44:59.154898 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.155351 kubelet[2019]: E0510 00:44:59.155103 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.155351 kubelet[2019]: E0510 00:44:59.155350 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.155542 kubelet[2019]: W0510 00:44:59.155369 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.156621 kubelet[2019]: E0510 00:44:59.156350 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.156621 kubelet[2019]: I0510 00:44:59.156403 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/2b9a7249-2bd8-45a6-8253-10147c8c745b-socket-dir\") pod \"csi-node-driver-84rrs\" (UID: \"2b9a7249-2bd8-45a6-8253-10147c8c745b\") " pod="calico-system/csi-node-driver-84rrs" May 10 00:44:59.156807 kubelet[2019]: E0510 00:44:59.156659 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.156807 kubelet[2019]: W0510 00:44:59.156681 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.156807 kubelet[2019]: E0510 00:44:59.156722 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.157125 kubelet[2019]: E0510 00:44:59.157104 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.157125 kubelet[2019]: W0510 00:44:59.157123 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.157225 kubelet[2019]: E0510 00:44:59.157147 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.157433 kubelet[2019]: E0510 00:44:59.157414 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.157497 kubelet[2019]: W0510 00:44:59.157431 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.157497 kubelet[2019]: E0510 00:44:59.157462 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.157560 kubelet[2019]: I0510 00:44:59.157502 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xzkcj\" (UniqueName: \"kubernetes.io/projected/2b9a7249-2bd8-45a6-8253-10147c8c745b-kube-api-access-xzkcj\") pod \"csi-node-driver-84rrs\" (UID: \"2b9a7249-2bd8-45a6-8253-10147c8c745b\") " pod="calico-system/csi-node-driver-84rrs" May 10 00:44:59.161890 kubelet[2019]: E0510 00:44:59.159926 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.161890 kubelet[2019]: W0510 00:44:59.159966 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.161890 kubelet[2019]: E0510 00:44:59.161592 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.161890 kubelet[2019]: I0510 00:44:59.161656 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/2b9a7249-2bd8-45a6-8253-10147c8c745b-kubelet-dir\") pod \"csi-node-driver-84rrs\" (UID: \"2b9a7249-2bd8-45a6-8253-10147c8c745b\") " pod="calico-system/csi-node-driver-84rrs" May 10 00:44:59.162279 kubelet[2019]: E0510 00:44:59.161983 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.162279 kubelet[2019]: W0510 00:44:59.162010 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.162804 kubelet[2019]: E0510 00:44:59.162394 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.163574 kubelet[2019]: E0510 00:44:59.162993 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.163574 kubelet[2019]: W0510 00:44:59.163018 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.163574 kubelet[2019]: E0510 00:44:59.163348 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.165326 kubelet[2019]: E0510 00:44:59.163842 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.165326 kubelet[2019]: W0510 00:44:59.163866 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.165326 kubelet[2019]: E0510 00:44:59.165159 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.165521 kubelet[2019]: E0510 00:44:59.165409 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.165521 kubelet[2019]: W0510 00:44:59.165430 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.165521 kubelet[2019]: E0510 00:44:59.165458 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.168579 kubelet[2019]: E0510 00:44:59.168535 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.168579 kubelet[2019]: W0510 00:44:59.168569 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.168813 kubelet[2019]: E0510 00:44:59.168609 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.169151 kubelet[2019]: E0510 00:44:59.169119 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.169151 kubelet[2019]: W0510 00:44:59.169139 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.169298 kubelet[2019]: E0510 00:44:59.169160 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.188301 env[1184]: time="2025-05-10T00:44:59.188257659Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-z2ft7,Uid:43942b98-caa7-4cb8-b797-cad1334d7d29,Namespace:calico-system,Attempt:0,} returns sandbox id \"799753e9d40197f7110033de92a8a275ea7f1919cd3b9d166d3a7b34ca2df890\"" May 10 00:44:59.189613 kubelet[2019]: E0510 00:44:59.189520 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:59.193023 env[1184]: time="2025-05-10T00:44:59.192976493Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 10 00:44:59.262448 kubelet[2019]: E0510 00:44:59.262234 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.262448 kubelet[2019]: W0510 00:44:59.262267 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.262448 kubelet[2019]: E0510 00:44:59.262297 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.263129 kubelet[2019]: E0510 00:44:59.262871 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.263129 kubelet[2019]: W0510 00:44:59.262896 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.263129 kubelet[2019]: E0510 00:44:59.262931 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.263547 kubelet[2019]: E0510 00:44:59.263369 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.263547 kubelet[2019]: W0510 00:44:59.263383 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.263547 kubelet[2019]: E0510 00:44:59.263412 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.264157 kubelet[2019]: E0510 00:44:59.263775 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.264157 kubelet[2019]: W0510 00:44:59.263795 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.264157 kubelet[2019]: E0510 00:44:59.263904 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.264157 kubelet[2019]: E0510 00:44:59.264020 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.264157 kubelet[2019]: W0510 00:44:59.264030 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.264157 kubelet[2019]: E0510 00:44:59.264086 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.264626 kubelet[2019]: E0510 00:44:59.264477 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.264626 kubelet[2019]: W0510 00:44:59.264493 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.264626 kubelet[2019]: E0510 00:44:59.264520 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.265017 kubelet[2019]: E0510 00:44:59.264867 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.265017 kubelet[2019]: W0510 00:44:59.264885 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.265017 kubelet[2019]: E0510 00:44:59.264938 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.265364 kubelet[2019]: E0510 00:44:59.265244 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.265364 kubelet[2019]: W0510 00:44:59.265257 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.265364 kubelet[2019]: E0510 00:44:59.265295 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.265666 kubelet[2019]: E0510 00:44:59.265551 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.265666 kubelet[2019]: W0510 00:44:59.265561 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.265666 kubelet[2019]: E0510 00:44:59.265594 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.266135 kubelet[2019]: E0510 00:44:59.265946 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.266135 kubelet[2019]: W0510 00:44:59.265977 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.266135 kubelet[2019]: E0510 00:44:59.266098 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.266500 kubelet[2019]: E0510 00:44:59.266354 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.266500 kubelet[2019]: W0510 00:44:59.266371 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.266500 kubelet[2019]: E0510 00:44:59.266417 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.268997 kubelet[2019]: E0510 00:44:59.268781 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.268997 kubelet[2019]: W0510 00:44:59.268804 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.268997 kubelet[2019]: E0510 00:44:59.268903 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.269428 kubelet[2019]: E0510 00:44:59.269263 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.269428 kubelet[2019]: W0510 00:44:59.269277 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.269428 kubelet[2019]: E0510 00:44:59.269379 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.269724 kubelet[2019]: E0510 00:44:59.269602 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.269724 kubelet[2019]: W0510 00:44:59.269613 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.269724 kubelet[2019]: E0510 00:44:59.269652 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.270136 kubelet[2019]: E0510 00:44:59.269976 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.270136 kubelet[2019]: W0510 00:44:59.269987 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.270136 kubelet[2019]: E0510 00:44:59.270022 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.270507 kubelet[2019]: E0510 00:44:59.270357 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.270507 kubelet[2019]: W0510 00:44:59.270369 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.270507 kubelet[2019]: E0510 00:44:59.270448 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.271221 kubelet[2019]: E0510 00:44:59.270767 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.271221 kubelet[2019]: W0510 00:44:59.270780 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.271221 kubelet[2019]: E0510 00:44:59.270831 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.273597 kubelet[2019]: E0510 00:44:59.273562 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.273921 kubelet[2019]: W0510 00:44:59.273894 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.274199 kubelet[2019]: E0510 00:44:59.274179 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.274423 kubelet[2019]: E0510 00:44:59.274342 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.274537 kubelet[2019]: W0510 00:44:59.274507 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.274743 kubelet[2019]: E0510 00:44:59.274707 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.275567 kubelet[2019]: E0510 00:44:59.275529 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.275721 kubelet[2019]: W0510 00:44:59.275704 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.275918 kubelet[2019]: E0510 00:44:59.275901 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.279479 kubelet[2019]: E0510 00:44:59.279441 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.279721 kubelet[2019]: W0510 00:44:59.279690 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.279961 kubelet[2019]: E0510 00:44:59.279941 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.280510 kubelet[2019]: E0510 00:44:59.280472 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.280692 kubelet[2019]: W0510 00:44:59.280665 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.280940 kubelet[2019]: E0510 00:44:59.280918 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.281368 kubelet[2019]: E0510 00:44:59.281345 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.281461 kubelet[2019]: W0510 00:44:59.281446 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.281629 kubelet[2019]: E0510 00:44:59.281616 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.283539 kubelet[2019]: E0510 00:44:59.283516 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.283711 kubelet[2019]: W0510 00:44:59.283687 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.283869 kubelet[2019]: E0510 00:44:59.283849 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.284453 kubelet[2019]: E0510 00:44:59.284429 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.284605 kubelet[2019]: W0510 00:44:59.284582 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.284709 kubelet[2019]: E0510 00:44:59.284694 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.293193 kubelet[2019]: E0510 00:44:59.293155 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:44:59.293426 kubelet[2019]: W0510 00:44:59.293398 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:44:59.293547 kubelet[2019]: E0510 00:44:59.293530 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:44:59.347333 env[1184]: time="2025-05-10T00:44:59.347278289Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-868c956bd4-7kg2z,Uid:1f6b8640-3ed1-4dca-b108-f75211bc9650,Namespace:calico-system,Attempt:0,} returns sandbox id \"b2998ff61c2fc2a4f7e424800f3dfcf36d084508918703020dba9c2617fb80bd\"" May 10 00:44:59.349281 kubelet[2019]: E0510 00:44:59.349240 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:44:59.379000 audit[2556]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2556 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:59.379000 audit[2556]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7fffa84a7d20 a2=0 a3=7fffa84a7d0c items=0 ppid=2170 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:59.379000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:59.390000 audit[2556]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2556 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:59.390000 audit[2556]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffa84a7d20 a2=0 a3=0 items=0 ppid=2170 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:59.390000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:00.806787 kubelet[2019]: E0510 00:45:00.805065 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-84rrs" podUID="2b9a7249-2bd8-45a6-8253-10147c8c745b" May 10 00:45:00.869816 env[1184]: time="2025-05-10T00:45:00.869752246Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:00.873456 env[1184]: time="2025-05-10T00:45:00.873401018Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:00.876327 env[1184]: time="2025-05-10T00:45:00.876263590Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:00.881547 env[1184]: time="2025-05-10T00:45:00.881421261Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 10 00:45:00.884992 env[1184]: time="2025-05-10T00:45:00.884938700Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:00.887557 env[1184]: time="2025-05-10T00:45:00.887502900Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 10 00:45:00.889286 env[1184]: time="2025-05-10T00:45:00.889035481Z" level=info msg="CreateContainer within sandbox \"799753e9d40197f7110033de92a8a275ea7f1919cd3b9d166d3a7b34ca2df890\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:45:00.923985 env[1184]: time="2025-05-10T00:45:00.923865119Z" level=info msg="CreateContainer within sandbox \"799753e9d40197f7110033de92a8a275ea7f1919cd3b9d166d3a7b34ca2df890\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"a3b69f88dcddb53d788b843f90969c4993a029c341b72e5e7c72c722f3e40018\"" May 10 00:45:00.926465 env[1184]: time="2025-05-10T00:45:00.926285916Z" level=info msg="StartContainer for \"a3b69f88dcddb53d788b843f90969c4993a029c341b72e5e7c72c722f3e40018\"" May 10 00:45:00.927994 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3767850369.mount: Deactivated successfully. May 10 00:45:00.967040 systemd[1]: Started cri-containerd-a3b69f88dcddb53d788b843f90969c4993a029c341b72e5e7c72c722f3e40018.scope. May 10 00:45:00.978132 systemd[1]: run-containerd-runc-k8s.io-a3b69f88dcddb53d788b843f90969c4993a029c341b72e5e7c72c722f3e40018-runc.iXQuyc.mount: Deactivated successfully. May 10 00:45:01.013000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.013000 audit[2564]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7efefa7be138 items=0 ppid=2453 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:01.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133623639663838646364646235336437383862383433663930393639 May 10 00:45:01.013000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.013000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.013000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.013000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.013000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.013000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.013000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.013000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.013000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.013000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.013000 audit: BPF prog-id=123 op=LOAD May 10 00:45:01.013000 audit[2564]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000183208 items=0 ppid=2453 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:01.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133623639663838646364646235336437383862383433663930393639 May 10 00:45:01.014000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.014000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.014000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.014000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.014000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.014000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.014000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.014000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.014000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.014000 audit: BPF prog-id=124 op=LOAD May 10 00:45:01.014000 audit[2564]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000183258 items=0 ppid=2453 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:01.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133623639663838646364646235336437383862383433663930393639 May 10 00:45:01.014000 audit: BPF prog-id=124 op=UNLOAD May 10 00:45:01.014000 audit: BPF prog-id=123 op=UNLOAD May 10 00:45:01.014000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.014000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.014000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.014000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.014000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.014000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.014000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.014000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.014000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.014000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.014000 audit: BPF prog-id=125 op=LOAD May 10 00:45:01.014000 audit[2564]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001832e8 items=0 ppid=2453 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:01.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133623639663838646364646235336437383862383433663930393639 May 10 00:45:01.039233 env[1184]: time="2025-05-10T00:45:01.039158856Z" level=info msg="StartContainer for \"a3b69f88dcddb53d788b843f90969c4993a029c341b72e5e7c72c722f3e40018\" returns successfully" May 10 00:45:01.064528 systemd[1]: cri-containerd-a3b69f88dcddb53d788b843f90969c4993a029c341b72e5e7c72c722f3e40018.scope: Deactivated successfully. May 10 00:45:01.069000 audit: BPF prog-id=125 op=UNLOAD May 10 00:45:01.120484 env[1184]: time="2025-05-10T00:45:01.120417547Z" level=info msg="shim disconnected" id=a3b69f88dcddb53d788b843f90969c4993a029c341b72e5e7c72c722f3e40018 May 10 00:45:01.120484 env[1184]: time="2025-05-10T00:45:01.120483129Z" level=warning msg="cleaning up after shim disconnected" id=a3b69f88dcddb53d788b843f90969c4993a029c341b72e5e7c72c722f3e40018 namespace=k8s.io May 10 00:45:01.120484 env[1184]: time="2025-05-10T00:45:01.120501242Z" level=info msg="cleaning up dead shim" May 10 00:45:01.133478 env[1184]: time="2025-05-10T00:45:01.133401346Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:45:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2603 runtime=io.containerd.runc.v2\n" May 10 00:45:01.911376 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a3b69f88dcddb53d788b843f90969c4993a029c341b72e5e7c72c722f3e40018-rootfs.mount: Deactivated successfully. May 10 00:45:01.997174 kubelet[2019]: E0510 00:45:01.997109 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:02.820546 kubelet[2019]: E0510 00:45:02.805065 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-84rrs" podUID="2b9a7249-2bd8-45a6-8253-10147c8c745b" May 10 00:45:04.225893 env[1184]: time="2025-05-10T00:45:04.225821552Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:04.228919 env[1184]: time="2025-05-10T00:45:04.228856063Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:04.230991 env[1184]: time="2025-05-10T00:45:04.230926828Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:04.233750 env[1184]: time="2025-05-10T00:45:04.233658627Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:04.235377 env[1184]: time="2025-05-10T00:45:04.234602748Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 10 00:45:04.240779 env[1184]: time="2025-05-10T00:45:04.237832599Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 10 00:45:04.269838 env[1184]: time="2025-05-10T00:45:04.269770719Z" level=info msg="CreateContainer within sandbox \"b2998ff61c2fc2a4f7e424800f3dfcf36d084508918703020dba9c2617fb80bd\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 10 00:45:04.326327 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3400410241.mount: Deactivated successfully. May 10 00:45:04.352320 env[1184]: time="2025-05-10T00:45:04.351843587Z" level=info msg="CreateContainer within sandbox \"b2998ff61c2fc2a4f7e424800f3dfcf36d084508918703020dba9c2617fb80bd\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"ae6b3b437909ba24059ca6347dae197925f98ed71a7cac6d441d8d960814938f\"" May 10 00:45:04.352986 env[1184]: time="2025-05-10T00:45:04.352915848Z" level=info msg="StartContainer for \"ae6b3b437909ba24059ca6347dae197925f98ed71a7cac6d441d8d960814938f\"" May 10 00:45:04.403801 systemd[1]: Started cri-containerd-ae6b3b437909ba24059ca6347dae197925f98ed71a7cac6d441d8d960814938f.scope. May 10 00:45:04.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.458584 kernel: kauditd_printk_skb: 166 callbacks suppressed May 10 00:45:04.458803 kernel: audit: type=1400 audit(1746837904.456:919): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.464558 kernel: audit: type=1400 audit(1746837904.456:920): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.468818 kernel: audit: type=1400 audit(1746837904.464:921): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.473885 kernel: audit: type=1400 audit(1746837904.464:922): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.474071 kernel: audit: type=1400 audit(1746837904.464:923): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.479368 kernel: audit: type=1400 audit(1746837904.464:924): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.489844 kernel: audit: type=1400 audit(1746837904.464:925): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.490159 kernel: audit: type=1400 audit(1746837904.464:926): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.507264 kernel: audit: type=1400 audit(1746837904.464:927): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.507538 kernel: audit: type=1400 audit(1746837904.464:928): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.464000 audit: BPF prog-id=126 op=LOAD May 10 00:45:04.468000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.468000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2406 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:04.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165366233623433373930396261323430353963613633343764616531 May 10 00:45:04.468000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.468000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2406 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:04.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165366233623433373930396261323430353963613633343764616531 May 10 00:45:04.468000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.468000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.468000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.468000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.468000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.468000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.468000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.468000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.468000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.468000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.468000 audit: BPF prog-id=127 op=LOAD May 10 00:45:04.468000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000211000 items=0 ppid=2406 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:04.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165366233623433373930396261323430353963613633343764616531 May 10 00:45:04.469000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.469000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.469000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.469000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.469000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.469000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.469000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.469000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.469000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.469000 audit: BPF prog-id=128 op=LOAD May 10 00:45:04.469000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000211048 items=0 ppid=2406 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:04.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165366233623433373930396261323430353963613633343764616531 May 10 00:45:04.469000 audit: BPF prog-id=128 op=UNLOAD May 10 00:45:04.469000 audit: BPF prog-id=127 op=UNLOAD May 10 00:45:04.469000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.469000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.469000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.469000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.469000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.469000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.469000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.469000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.469000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.469000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:04.469000 audit: BPF prog-id=129 op=LOAD May 10 00:45:04.469000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000211458 items=0 ppid=2406 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:04.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165366233623433373930396261323430353963613633343764616531 May 10 00:45:04.553366 env[1184]: time="2025-05-10T00:45:04.552361568Z" level=info msg="StartContainer for \"ae6b3b437909ba24059ca6347dae197925f98ed71a7cac6d441d8d960814938f\" returns successfully" May 10 00:45:04.804472 kubelet[2019]: E0510 00:45:04.804280 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-84rrs" podUID="2b9a7249-2bd8-45a6-8253-10147c8c745b" May 10 00:45:05.008605 kubelet[2019]: E0510 00:45:05.008541 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:05.029276 kubelet[2019]: I0510 00:45:05.029157 2019 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-868c956bd4-7kg2z" podStartSLOduration=2.143906662 podStartE2EDuration="7.029122286s" podCreationTimestamp="2025-05-10 00:44:58 +0000 UTC" firstStartedPulling="2025-05-10 00:44:59.351415994 +0000 UTC m=+20.843568245" lastFinishedPulling="2025-05-10 00:45:04.236631617 +0000 UTC m=+25.728783869" observedRunningTime="2025-05-10 00:45:05.029058508 +0000 UTC m=+26.521210782" watchObservedRunningTime="2025-05-10 00:45:05.029122286 +0000 UTC m=+26.521274560" May 10 00:45:06.023842 kubelet[2019]: I0510 00:45:06.023784 2019 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:45:06.024823 kubelet[2019]: E0510 00:45:06.024783 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:06.806349 kubelet[2019]: E0510 00:45:06.805197 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-84rrs" podUID="2b9a7249-2bd8-45a6-8253-10147c8c745b" May 10 00:45:08.806510 kubelet[2019]: E0510 00:45:08.806451 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-84rrs" podUID="2b9a7249-2bd8-45a6-8253-10147c8c745b" May 10 00:45:09.713532 env[1184]: time="2025-05-10T00:45:09.713463464Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:09.715988 env[1184]: time="2025-05-10T00:45:09.715934120Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:09.717987 env[1184]: time="2025-05-10T00:45:09.717927934Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:09.719958 env[1184]: time="2025-05-10T00:45:09.719908104Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:09.721040 env[1184]: time="2025-05-10T00:45:09.720971563Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 10 00:45:09.727318 env[1184]: time="2025-05-10T00:45:09.727239790Z" level=info msg="CreateContainer within sandbox \"799753e9d40197f7110033de92a8a275ea7f1919cd3b9d166d3a7b34ca2df890\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:45:09.755122 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount147660807.mount: Deactivated successfully. May 10 00:45:09.762002 env[1184]: time="2025-05-10T00:45:09.761882630Z" level=info msg="CreateContainer within sandbox \"799753e9d40197f7110033de92a8a275ea7f1919cd3b9d166d3a7b34ca2df890\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"b5470daeb9b4809909f5dd48c3d2df288cdb61a3e6dec7f0feba102b80d2eab5\"" May 10 00:45:09.764180 env[1184]: time="2025-05-10T00:45:09.762926553Z" level=info msg="StartContainer for \"b5470daeb9b4809909f5dd48c3d2df288cdb61a3e6dec7f0feba102b80d2eab5\"" May 10 00:45:09.833055 systemd[1]: run-containerd-runc-k8s.io-b5470daeb9b4809909f5dd48c3d2df288cdb61a3e6dec7f0feba102b80d2eab5-runc.XZqMBL.mount: Deactivated successfully. May 10 00:45:09.839932 systemd[1]: Started cri-containerd-b5470daeb9b4809909f5dd48c3d2df288cdb61a3e6dec7f0feba102b80d2eab5.scope. May 10 00:45:09.878000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.880846 kernel: kauditd_printk_skb: 47 callbacks suppressed May 10 00:45:09.881034 kernel: audit: type=1400 audit(1746837909.878:937): avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.878000 audit[2669]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f4ca0cfb138 items=0 ppid=2453 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:09.888569 kernel: audit: type=1300 audit(1746837909.878:937): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f4ca0cfb138 items=0 ppid=2453 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:09.888769 kernel: audit: type=1327 audit(1746837909.878:937): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235343730646165623962343830393930396635646434386333643264 May 10 00:45:09.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235343730646165623962343830393930396635646434386333643264 May 10 00:45:09.879000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.895162 kernel: audit: type=1400 audit(1746837909.879:938): avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.895334 kernel: audit: type=1400 audit(1746837909.879:938): avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.879000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.879000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.900855 kernel: audit: type=1400 audit(1746837909.879:938): avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.879000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.904173 kernel: audit: type=1400 audit(1746837909.879:938): avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.879000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.909886 kernel: audit: type=1400 audit(1746837909.879:938): avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.910062 kernel: audit: type=1400 audit(1746837909.879:938): avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.879000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.879000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.919051 kernel: audit: type=1400 audit(1746837909.879:938): avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.879000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.879000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.879000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.879000 audit: BPF prog-id=130 op=LOAD May 10 00:45:09.879000 audit[2669]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00037e5e8 items=0 ppid=2453 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:09.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235343730646165623962343830393930396635646434386333643264 May 10 00:45:09.883000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.883000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.883000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.883000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.883000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.883000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.883000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.883000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.883000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.883000 audit: BPF prog-id=131 op=LOAD May 10 00:45:09.883000 audit[2669]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00037e638 items=0 ppid=2453 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:09.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235343730646165623962343830393930396635646434386333643264 May 10 00:45:09.891000 audit: BPF prog-id=131 op=UNLOAD May 10 00:45:09.891000 audit: BPF prog-id=130 op=UNLOAD May 10 00:45:09.891000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.891000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.891000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.891000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.891000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.891000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.891000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.891000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.891000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.891000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.891000 audit: BPF prog-id=132 op=LOAD May 10 00:45:09.891000 audit[2669]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00037e6c8 items=0 ppid=2453 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:09.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235343730646165623962343830393930396635646434386333643264 May 10 00:45:09.938373 env[1184]: time="2025-05-10T00:45:09.938268620Z" level=info msg="StartContainer for \"b5470daeb9b4809909f5dd48c3d2df288cdb61a3e6dec7f0feba102b80d2eab5\" returns successfully" May 10 00:45:10.044752 kubelet[2019]: E0510 00:45:10.044253 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:10.787277 env[1184]: time="2025-05-10T00:45:10.787146079Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:45:10.792247 systemd[1]: cri-containerd-b5470daeb9b4809909f5dd48c3d2df288cdb61a3e6dec7f0feba102b80d2eab5.scope: Deactivated successfully. May 10 00:45:10.795000 audit: BPF prog-id=132 op=UNLOAD May 10 00:45:10.803088 kubelet[2019]: I0510 00:45:10.803033 2019 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 10 00:45:10.819900 systemd[1]: Created slice kubepods-besteffort-pod2b9a7249_2bd8_45a6_8253_10147c8c745b.slice. May 10 00:45:10.848723 env[1184]: time="2025-05-10T00:45:10.845450390Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-84rrs,Uid:2b9a7249-2bd8-45a6-8253-10147c8c745b,Namespace:calico-system,Attempt:0,}" May 10 00:45:10.915524 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b5470daeb9b4809909f5dd48c3d2df288cdb61a3e6dec7f0feba102b80d2eab5-rootfs.mount: Deactivated successfully. May 10 00:45:10.943317 kubelet[2019]: I0510 00:45:10.943213 2019 topology_manager.go:215] "Topology Admit Handler" podUID="096fc47e-332e-45a4-ba28-0d240852b6c0" podNamespace="kube-system" podName="coredns-7db6d8ff4d-w2pfg" May 10 00:45:10.948667 env[1184]: time="2025-05-10T00:45:10.947785419Z" level=info msg="shim disconnected" id=b5470daeb9b4809909f5dd48c3d2df288cdb61a3e6dec7f0feba102b80d2eab5 May 10 00:45:10.948667 env[1184]: time="2025-05-10T00:45:10.947870677Z" level=warning msg="cleaning up after shim disconnected" id=b5470daeb9b4809909f5dd48c3d2df288cdb61a3e6dec7f0feba102b80d2eab5 namespace=k8s.io May 10 00:45:10.948667 env[1184]: time="2025-05-10T00:45:10.947889050Z" level=info msg="cleaning up dead shim" May 10 00:45:10.960714 systemd[1]: Created slice kubepods-burstable-pod096fc47e_332e_45a4_ba28_0d240852b6c0.slice. May 10 00:45:10.995258 kubelet[2019]: I0510 00:45:10.995141 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/096fc47e-332e-45a4-ba28-0d240852b6c0-config-volume\") pod \"coredns-7db6d8ff4d-w2pfg\" (UID: \"096fc47e-332e-45a4-ba28-0d240852b6c0\") " pod="kube-system/coredns-7db6d8ff4d-w2pfg" May 10 00:45:10.995258 kubelet[2019]: I0510 00:45:10.995235 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mxx9w\" (UniqueName: \"kubernetes.io/projected/096fc47e-332e-45a4-ba28-0d240852b6c0-kube-api-access-mxx9w\") pod \"coredns-7db6d8ff4d-w2pfg\" (UID: \"096fc47e-332e-45a4-ba28-0d240852b6c0\") " pod="kube-system/coredns-7db6d8ff4d-w2pfg" May 10 00:45:11.008274 kubelet[2019]: I0510 00:45:11.008200 2019 topology_manager.go:215] "Topology Admit Handler" podUID="23cdbc27-8426-4777-969e-b9508b2b58c7" podNamespace="kube-system" podName="coredns-7db6d8ff4d-g6mxn" May 10 00:45:11.008997 kubelet[2019]: I0510 00:45:11.008944 2019 topology_manager.go:215] "Topology Admit Handler" podUID="131c747f-d395-4c4b-8559-06ad886de3fa" podNamespace="calico-apiserver" podName="calico-apiserver-59f5cd6df4-k8vdw" May 10 00:45:11.024423 kubelet[2019]: I0510 00:45:11.024349 2019 topology_manager.go:215] "Topology Admit Handler" podUID="bbc2d3bc-030b-407e-bd10-438dc51276da" podNamespace="calico-system" podName="calico-kube-controllers-5fb854744b-zgtlb" May 10 00:45:11.024795 kubelet[2019]: I0510 00:45:11.024664 2019 topology_manager.go:215] "Topology Admit Handler" podUID="92e30503-0699-4ea6-bf79-a0a97419537f" podNamespace="calico-apiserver" podName="calico-apiserver-59f5cd6df4-9cds2" May 10 00:45:11.048970 systemd[1]: Created slice kubepods-burstable-pod23cdbc27_8426_4777_969e_b9508b2b58c7.slice. May 10 00:45:11.065358 kubelet[2019]: E0510 00:45:11.065270 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:11.083413 env[1184]: time="2025-05-10T00:45:11.082551160Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:45:11Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2719 runtime=io.containerd.runc.v2\n" May 10 00:45:11.092139 systemd[1]: Created slice kubepods-besteffort-pod92e30503_0699_4ea6_bf79_a0a97419537f.slice. May 10 00:45:11.097141 kubelet[2019]: I0510 00:45:11.095948 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/23cdbc27-8426-4777-969e-b9508b2b58c7-config-volume\") pod \"coredns-7db6d8ff4d-g6mxn\" (UID: \"23cdbc27-8426-4777-969e-b9508b2b58c7\") " pod="kube-system/coredns-7db6d8ff4d-g6mxn" May 10 00:45:11.097141 kubelet[2019]: I0510 00:45:11.096009 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dbdc4\" (UniqueName: \"kubernetes.io/projected/131c747f-d395-4c4b-8559-06ad886de3fa-kube-api-access-dbdc4\") pod \"calico-apiserver-59f5cd6df4-k8vdw\" (UID: \"131c747f-d395-4c4b-8559-06ad886de3fa\") " pod="calico-apiserver/calico-apiserver-59f5cd6df4-k8vdw" May 10 00:45:11.097141 kubelet[2019]: I0510 00:45:11.096038 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bbc2d3bc-030b-407e-bd10-438dc51276da-tigera-ca-bundle\") pod \"calico-kube-controllers-5fb854744b-zgtlb\" (UID: \"bbc2d3bc-030b-407e-bd10-438dc51276da\") " pod="calico-system/calico-kube-controllers-5fb854744b-zgtlb" May 10 00:45:11.097141 kubelet[2019]: I0510 00:45:11.096090 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xcp6r\" (UniqueName: \"kubernetes.io/projected/92e30503-0699-4ea6-bf79-a0a97419537f-kube-api-access-xcp6r\") pod \"calico-apiserver-59f5cd6df4-9cds2\" (UID: \"92e30503-0699-4ea6-bf79-a0a97419537f\") " pod="calico-apiserver/calico-apiserver-59f5cd6df4-9cds2" May 10 00:45:11.097141 kubelet[2019]: I0510 00:45:11.096142 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2z9pp\" (UniqueName: \"kubernetes.io/projected/23cdbc27-8426-4777-969e-b9508b2b58c7-kube-api-access-2z9pp\") pod \"coredns-7db6d8ff4d-g6mxn\" (UID: \"23cdbc27-8426-4777-969e-b9508b2b58c7\") " pod="kube-system/coredns-7db6d8ff4d-g6mxn" May 10 00:45:11.097709 kubelet[2019]: I0510 00:45:11.096173 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/131c747f-d395-4c4b-8559-06ad886de3fa-calico-apiserver-certs\") pod \"calico-apiserver-59f5cd6df4-k8vdw\" (UID: \"131c747f-d395-4c4b-8559-06ad886de3fa\") " pod="calico-apiserver/calico-apiserver-59f5cd6df4-k8vdw" May 10 00:45:11.097709 kubelet[2019]: I0510 00:45:11.096207 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9v4g5\" (UniqueName: \"kubernetes.io/projected/bbc2d3bc-030b-407e-bd10-438dc51276da-kube-api-access-9v4g5\") pod \"calico-kube-controllers-5fb854744b-zgtlb\" (UID: \"bbc2d3bc-030b-407e-bd10-438dc51276da\") " pod="calico-system/calico-kube-controllers-5fb854744b-zgtlb" May 10 00:45:11.097709 kubelet[2019]: I0510 00:45:11.096258 2019 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/92e30503-0699-4ea6-bf79-a0a97419537f-calico-apiserver-certs\") pod \"calico-apiserver-59f5cd6df4-9cds2\" (UID: \"92e30503-0699-4ea6-bf79-a0a97419537f\") " pod="calico-apiserver/calico-apiserver-59f5cd6df4-9cds2" May 10 00:45:11.119016 systemd[1]: Created slice kubepods-besteffort-pod131c747f_d395_4c4b_8559_06ad886de3fa.slice. May 10 00:45:11.141987 systemd[1]: Created slice kubepods-besteffort-podbbc2d3bc_030b_407e_bd10_438dc51276da.slice. May 10 00:45:11.304620 kubelet[2019]: E0510 00:45:11.304031 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:11.306375 env[1184]: time="2025-05-10T00:45:11.306302883Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-w2pfg,Uid:096fc47e-332e-45a4-ba28-0d240852b6c0,Namespace:kube-system,Attempt:0,}" May 10 00:45:11.376250 env[1184]: time="2025-05-10T00:45:11.376097149Z" level=error msg="Failed to destroy network for sandbox \"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.377030 env[1184]: time="2025-05-10T00:45:11.376889389Z" level=error msg="encountered an error cleaning up failed sandbox \"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.377201 env[1184]: time="2025-05-10T00:45:11.377061798Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-84rrs,Uid:2b9a7249-2bd8-45a6-8253-10147c8c745b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.377644 kubelet[2019]: E0510 00:45:11.377554 2019 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.378153 kubelet[2019]: E0510 00:45:11.377691 2019 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-84rrs" May 10 00:45:11.378153 kubelet[2019]: E0510 00:45:11.377763 2019 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-84rrs" May 10 00:45:11.378153 kubelet[2019]: E0510 00:45:11.377863 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-84rrs_calico-system(2b9a7249-2bd8-45a6-8253-10147c8c745b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-84rrs_calico-system(2b9a7249-2bd8-45a6-8253-10147c8c745b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-84rrs" podUID="2b9a7249-2bd8-45a6-8253-10147c8c745b" May 10 00:45:11.387227 kubelet[2019]: E0510 00:45:11.387164 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:11.397090 env[1184]: time="2025-05-10T00:45:11.397008644Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-g6mxn,Uid:23cdbc27-8426-4777-969e-b9508b2b58c7,Namespace:kube-system,Attempt:0,}" May 10 00:45:11.410440 env[1184]: time="2025-05-10T00:45:11.410383946Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59f5cd6df4-9cds2,Uid:92e30503-0699-4ea6-bf79-a0a97419537f,Namespace:calico-apiserver,Attempt:0,}" May 10 00:45:11.445720 env[1184]: time="2025-05-10T00:45:11.445638711Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59f5cd6df4-k8vdw,Uid:131c747f-d395-4c4b-8559-06ad886de3fa,Namespace:calico-apiserver,Attempt:0,}" May 10 00:45:11.489324 env[1184]: time="2025-05-10T00:45:11.489254966Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5fb854744b-zgtlb,Uid:bbc2d3bc-030b-407e-bd10-438dc51276da,Namespace:calico-system,Attempt:0,}" May 10 00:45:11.670588 env[1184]: time="2025-05-10T00:45:11.670395314Z" level=error msg="Failed to destroy network for sandbox \"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.671176 env[1184]: time="2025-05-10T00:45:11.671061516Z" level=error msg="encountered an error cleaning up failed sandbox \"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.671372 env[1184]: time="2025-05-10T00:45:11.671221760Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-w2pfg,Uid:096fc47e-332e-45a4-ba28-0d240852b6c0,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.676033 kubelet[2019]: E0510 00:45:11.671783 2019 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.676033 kubelet[2019]: E0510 00:45:11.671897 2019 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-w2pfg" May 10 00:45:11.676033 kubelet[2019]: E0510 00:45:11.671944 2019 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-w2pfg" May 10 00:45:11.677178 kubelet[2019]: E0510 00:45:11.672025 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-w2pfg_kube-system(096fc47e-332e-45a4-ba28-0d240852b6c0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-w2pfg_kube-system(096fc47e-332e-45a4-ba28-0d240852b6c0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-w2pfg" podUID="096fc47e-332e-45a4-ba28-0d240852b6c0" May 10 00:45:11.753123 env[1184]: time="2025-05-10T00:45:11.753030385Z" level=error msg="Failed to destroy network for sandbox \"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.753676 env[1184]: time="2025-05-10T00:45:11.753615061Z" level=error msg="encountered an error cleaning up failed sandbox \"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.753792 env[1184]: time="2025-05-10T00:45:11.753705784Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59f5cd6df4-9cds2,Uid:92e30503-0699-4ea6-bf79-a0a97419537f,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.754070 kubelet[2019]: E0510 00:45:11.754015 2019 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.754187 kubelet[2019]: E0510 00:45:11.754096 2019 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-59f5cd6df4-9cds2" May 10 00:45:11.754187 kubelet[2019]: E0510 00:45:11.754158 2019 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-59f5cd6df4-9cds2" May 10 00:45:11.754339 kubelet[2019]: E0510 00:45:11.754216 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-59f5cd6df4-9cds2_calico-apiserver(92e30503-0699-4ea6-bf79-a0a97419537f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-59f5cd6df4-9cds2_calico-apiserver(92e30503-0699-4ea6-bf79-a0a97419537f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-59f5cd6df4-9cds2" podUID="92e30503-0699-4ea6-bf79-a0a97419537f" May 10 00:45:11.778104 env[1184]: time="2025-05-10T00:45:11.778014064Z" level=error msg="Failed to destroy network for sandbox \"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.779081 env[1184]: time="2025-05-10T00:45:11.778975106Z" level=error msg="encountered an error cleaning up failed sandbox \"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.779499 env[1184]: time="2025-05-10T00:45:11.779436547Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-g6mxn,Uid:23cdbc27-8426-4777-969e-b9508b2b58c7,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.780115 kubelet[2019]: E0510 00:45:11.780059 2019 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.780249 kubelet[2019]: E0510 00:45:11.780149 2019 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-g6mxn" May 10 00:45:11.780249 kubelet[2019]: E0510 00:45:11.780181 2019 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-g6mxn" May 10 00:45:11.780378 kubelet[2019]: E0510 00:45:11.780248 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-g6mxn_kube-system(23cdbc27-8426-4777-969e-b9508b2b58c7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-g6mxn_kube-system(23cdbc27-8426-4777-969e-b9508b2b58c7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-g6mxn" podUID="23cdbc27-8426-4777-969e-b9508b2b58c7" May 10 00:45:11.801255 env[1184]: time="2025-05-10T00:45:11.800976535Z" level=error msg="Failed to destroy network for sandbox \"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.801755 env[1184]: time="2025-05-10T00:45:11.801552741Z" level=error msg="encountered an error cleaning up failed sandbox \"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.801755 env[1184]: time="2025-05-10T00:45:11.801632649Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5fb854744b-zgtlb,Uid:bbc2d3bc-030b-407e-bd10-438dc51276da,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.803812 kubelet[2019]: E0510 00:45:11.802252 2019 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.803812 kubelet[2019]: E0510 00:45:11.802399 2019 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5fb854744b-zgtlb" May 10 00:45:11.803812 kubelet[2019]: E0510 00:45:11.802448 2019 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5fb854744b-zgtlb" May 10 00:45:11.804270 kubelet[2019]: E0510 00:45:11.802518 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5fb854744b-zgtlb_calico-system(bbc2d3bc-030b-407e-bd10-438dc51276da)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5fb854744b-zgtlb_calico-system(bbc2d3bc-030b-407e-bd10-438dc51276da)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5fb854744b-zgtlb" podUID="bbc2d3bc-030b-407e-bd10-438dc51276da" May 10 00:45:11.804700 env[1184]: time="2025-05-10T00:45:11.804599105Z" level=error msg="Failed to destroy network for sandbox \"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.805456 env[1184]: time="2025-05-10T00:45:11.805406725Z" level=error msg="encountered an error cleaning up failed sandbox \"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.805913 env[1184]: time="2025-05-10T00:45:11.805859875Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59f5cd6df4-k8vdw,Uid:131c747f-d395-4c4b-8559-06ad886de3fa,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.806426 kubelet[2019]: E0510 00:45:11.806344 2019 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:11.806530 kubelet[2019]: E0510 00:45:11.806438 2019 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-59f5cd6df4-k8vdw" May 10 00:45:11.806530 kubelet[2019]: E0510 00:45:11.806465 2019 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-59f5cd6df4-k8vdw" May 10 00:45:11.806609 kubelet[2019]: E0510 00:45:11.806520 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-59f5cd6df4-k8vdw_calico-apiserver(131c747f-d395-4c4b-8559-06ad886de3fa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-59f5cd6df4-k8vdw_calico-apiserver(131c747f-d395-4c4b-8559-06ad886de3fa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-59f5cd6df4-k8vdw" podUID="131c747f-d395-4c4b-8559-06ad886de3fa" May 10 00:45:11.900705 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da-shm.mount: Deactivated successfully. May 10 00:45:12.080194 kubelet[2019]: I0510 00:45:12.073802 2019 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" May 10 00:45:12.080673 env[1184]: time="2025-05-10T00:45:12.075651885Z" level=info msg="StopPodSandbox for \"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\"" May 10 00:45:12.082566 kubelet[2019]: I0510 00:45:12.082246 2019 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" May 10 00:45:12.091261 env[1184]: time="2025-05-10T00:45:12.091204258Z" level=info msg="StopPodSandbox for \"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\"" May 10 00:45:12.095073 kubelet[2019]: I0510 00:45:12.094992 2019 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" May 10 00:45:12.096980 env[1184]: time="2025-05-10T00:45:12.096452733Z" level=info msg="StopPodSandbox for \"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\"" May 10 00:45:12.103104 kubelet[2019]: E0510 00:45:12.103027 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:12.117946 env[1184]: time="2025-05-10T00:45:12.117873347Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 10 00:45:12.121755 kubelet[2019]: I0510 00:45:12.121660 2019 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" May 10 00:45:12.125291 env[1184]: time="2025-05-10T00:45:12.125231322Z" level=info msg="StopPodSandbox for \"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\"" May 10 00:45:12.131410 kubelet[2019]: I0510 00:45:12.130225 2019 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" May 10 00:45:12.134152 env[1184]: time="2025-05-10T00:45:12.132019879Z" level=info msg="StopPodSandbox for \"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\"" May 10 00:45:12.138792 kubelet[2019]: I0510 00:45:12.138534 2019 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" May 10 00:45:12.145802 env[1184]: time="2025-05-10T00:45:12.141776400Z" level=info msg="StopPodSandbox for \"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\"" May 10 00:45:12.256166 env[1184]: time="2025-05-10T00:45:12.256037427Z" level=error msg="StopPodSandbox for \"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\" failed" error="failed to destroy network for sandbox \"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:12.256401 env[1184]: time="2025-05-10T00:45:12.256289809Z" level=error msg="StopPodSandbox for \"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\" failed" error="failed to destroy network for sandbox \"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:12.257194 kubelet[2019]: E0510 00:45:12.256609 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" May 10 00:45:12.257194 kubelet[2019]: E0510 00:45:12.256609 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" May 10 00:45:12.257194 kubelet[2019]: E0510 00:45:12.256853 2019 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39"} May 10 00:45:12.257194 kubelet[2019]: E0510 00:45:12.256991 2019 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"131c747f-d395-4c4b-8559-06ad886de3fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:45:12.257614 kubelet[2019]: E0510 00:45:12.257031 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"131c747f-d395-4c4b-8559-06ad886de3fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-59f5cd6df4-k8vdw" podUID="131c747f-d395-4c4b-8559-06ad886de3fa" May 10 00:45:12.257614 kubelet[2019]: E0510 00:45:12.256828 2019 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f"} May 10 00:45:12.257614 kubelet[2019]: E0510 00:45:12.257123 2019 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"096fc47e-332e-45a4-ba28-0d240852b6c0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:45:12.257614 kubelet[2019]: E0510 00:45:12.257151 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"096fc47e-332e-45a4-ba28-0d240852b6c0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-w2pfg" podUID="096fc47e-332e-45a4-ba28-0d240852b6c0" May 10 00:45:12.317203 env[1184]: time="2025-05-10T00:45:12.317077144Z" level=error msg="StopPodSandbox for \"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\" failed" error="failed to destroy network for sandbox \"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:12.318202 kubelet[2019]: E0510 00:45:12.317972 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" May 10 00:45:12.318202 kubelet[2019]: E0510 00:45:12.318052 2019 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75"} May 10 00:45:12.318202 kubelet[2019]: E0510 00:45:12.318111 2019 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"23cdbc27-8426-4777-969e-b9508b2b58c7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:45:12.318202 kubelet[2019]: E0510 00:45:12.318147 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"23cdbc27-8426-4777-969e-b9508b2b58c7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-g6mxn" podUID="23cdbc27-8426-4777-969e-b9508b2b58c7" May 10 00:45:12.355607 env[1184]: time="2025-05-10T00:45:12.353430887Z" level=error msg="StopPodSandbox for \"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\" failed" error="failed to destroy network for sandbox \"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:12.356672 kubelet[2019]: E0510 00:45:12.356438 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" May 10 00:45:12.356672 kubelet[2019]: E0510 00:45:12.356522 2019 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128"} May 10 00:45:12.356672 kubelet[2019]: E0510 00:45:12.356586 2019 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"92e30503-0699-4ea6-bf79-a0a97419537f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:45:12.356672 kubelet[2019]: E0510 00:45:12.356617 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"92e30503-0699-4ea6-bf79-a0a97419537f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-59f5cd6df4-9cds2" podUID="92e30503-0699-4ea6-bf79-a0a97419537f" May 10 00:45:12.357379 env[1184]: time="2025-05-10T00:45:12.356053376Z" level=error msg="StopPodSandbox for \"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\" failed" error="failed to destroy network for sandbox \"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:12.358402 kubelet[2019]: E0510 00:45:12.358100 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" May 10 00:45:12.358402 kubelet[2019]: E0510 00:45:12.358228 2019 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da"} May 10 00:45:12.358402 kubelet[2019]: E0510 00:45:12.358306 2019 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2b9a7249-2bd8-45a6-8253-10147c8c745b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:45:12.358402 kubelet[2019]: E0510 00:45:12.358344 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2b9a7249-2bd8-45a6-8253-10147c8c745b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-84rrs" podUID="2b9a7249-2bd8-45a6-8253-10147c8c745b" May 10 00:45:12.361426 env[1184]: time="2025-05-10T00:45:12.361276548Z" level=error msg="StopPodSandbox for \"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\" failed" error="failed to destroy network for sandbox \"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:12.362496 kubelet[2019]: E0510 00:45:12.362195 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" May 10 00:45:12.362496 kubelet[2019]: E0510 00:45:12.362309 2019 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875"} May 10 00:45:12.362496 kubelet[2019]: E0510 00:45:12.362365 2019 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bbc2d3bc-030b-407e-bd10-438dc51276da\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:45:12.362496 kubelet[2019]: E0510 00:45:12.362406 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bbc2d3bc-030b-407e-bd10-438dc51276da\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5fb854744b-zgtlb" podUID="bbc2d3bc-030b-407e-bd10-438dc51276da" May 10 00:45:20.416884 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3532413698.mount: Deactivated successfully. May 10 00:45:20.463890 env[1184]: time="2025-05-10T00:45:20.463818132Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:20.467404 env[1184]: time="2025-05-10T00:45:20.467341488Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:20.470412 env[1184]: time="2025-05-10T00:45:20.470347606Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:20.472823 env[1184]: time="2025-05-10T00:45:20.472757365Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 10 00:45:20.473478 env[1184]: time="2025-05-10T00:45:20.473291864Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:20.512216 env[1184]: time="2025-05-10T00:45:20.512162309Z" level=info msg="CreateContainer within sandbox \"799753e9d40197f7110033de92a8a275ea7f1919cd3b9d166d3a7b34ca2df890\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:45:20.535290 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1812950392.mount: Deactivated successfully. May 10 00:45:20.540991 env[1184]: time="2025-05-10T00:45:20.540901098Z" level=info msg="CreateContainer within sandbox \"799753e9d40197f7110033de92a8a275ea7f1919cd3b9d166d3a7b34ca2df890\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e9d9994f15584b0a9a6f75a4929296fce69c2fd4c0f3ba844087eb24b1a74e0e\"" May 10 00:45:20.542774 env[1184]: time="2025-05-10T00:45:20.542109563Z" level=info msg="StartContainer for \"e9d9994f15584b0a9a6f75a4929296fce69c2fd4c0f3ba844087eb24b1a74e0e\"" May 10 00:45:20.601233 systemd[1]: Started cri-containerd-e9d9994f15584b0a9a6f75a4929296fce69c2fd4c0f3ba844087eb24b1a74e0e.scope. May 10 00:45:20.642694 kernel: kauditd_printk_skb: 34 callbacks suppressed May 10 00:45:20.654765 kernel: audit: type=1400 audit(1746837920.637:944): avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.654902 kernel: audit: type=1300 audit(1746837920.637:944): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001216b0 a2=3c a3=7fc9ec739718 items=0 ppid=2453 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:20.655072 kernel: audit: type=1327 audit(1746837920.637:944): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539643939393466313535383462306139613666373561343932393239 May 10 00:45:20.655112 kernel: audit: type=1400 audit(1746837920.641:945): avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.637000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.637000 audit[3041]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001216b0 a2=3c a3=7fc9ec739718 items=0 ppid=2453 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:20.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539643939393466313535383462306139613666373561343932393239 May 10 00:45:20.658815 kernel: audit: type=1400 audit(1746837920.641:945): avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.641000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.663286 kernel: audit: type=1400 audit(1746837920.641:945): avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.641000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.641000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.641000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.665883 kernel: audit: type=1400 audit(1746837920.641:945): avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.641000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.680586 kernel: audit: type=1400 audit(1746837920.641:945): avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.680796 kernel: audit: type=1400 audit(1746837920.641:945): avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.641000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.641000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.684796 kernel: audit: type=1400 audit(1746837920.641:945): avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.641000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.641000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.641000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.641000 audit: BPF prog-id=133 op=LOAD May 10 00:45:20.641000 audit[3041]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001219d8 a2=78 a3=c000290218 items=0 ppid=2453 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:20.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539643939393466313535383462306139613666373561343932393239 May 10 00:45:20.646000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.646000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.646000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.646000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.646000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.646000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.646000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.646000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.646000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.646000 audit: BPF prog-id=134 op=LOAD May 10 00:45:20.646000 audit[3041]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000121770 a2=78 a3=c000290268 items=0 ppid=2453 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:20.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539643939393466313535383462306139613666373561343932393239 May 10 00:45:20.650000 audit: BPF prog-id=134 op=UNLOAD May 10 00:45:20.650000 audit: BPF prog-id=133 op=UNLOAD May 10 00:45:20.650000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.650000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.650000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.650000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.650000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.650000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.650000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.650000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.650000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.650000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:20.650000 audit: BPF prog-id=135 op=LOAD May 10 00:45:20.650000 audit[3041]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000121c30 a2=78 a3=c0002902f8 items=0 ppid=2453 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:20.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539643939393466313535383462306139613666373561343932393239 May 10 00:45:20.696496 env[1184]: time="2025-05-10T00:45:20.696036727Z" level=info msg="StartContainer for \"e9d9994f15584b0a9a6f75a4929296fce69c2fd4c0f3ba844087eb24b1a74e0e\" returns successfully" May 10 00:45:20.903295 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 10 00:45:20.903568 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 10 00:45:21.251358 kubelet[2019]: E0510 00:45:21.251292 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:21.317668 kubelet[2019]: I0510 00:45:21.317555 2019 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-z2ft7" podStartSLOduration=2.029147579 podStartE2EDuration="23.312576192s" podCreationTimestamp="2025-05-10 00:44:58 +0000 UTC" firstStartedPulling="2025-05-10 00:44:59.190769783 +0000 UTC m=+20.682922048" lastFinishedPulling="2025-05-10 00:45:20.474198412 +0000 UTC m=+41.966350661" observedRunningTime="2025-05-10 00:45:21.310205303 +0000 UTC m=+42.802357576" watchObservedRunningTime="2025-05-10 00:45:21.312576192 +0000 UTC m=+42.804728464" May 10 00:45:22.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-143.198.48.176:22-139.178.68.195:38064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:22.135544 systemd[1]: Started sshd@7-143.198.48.176:22-139.178.68.195:38064.service. May 10 00:45:22.177787 kubelet[2019]: E0510 00:45:22.177632 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:22.238000 audit[3118]: USER_ACCT pid=3118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:22.242420 sshd[3118]: Accepted publickey for core from 139.178.68.195 port 38064 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:45:22.241000 audit[3118]: CRED_ACQ pid=3118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:22.241000 audit[3118]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe0906470 a2=3 a3=0 items=0 ppid=1 pid=3118 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:22.241000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:45:22.247457 sshd[3118]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:22.261545 systemd-logind[1176]: New session 8 of user core. May 10 00:45:22.262164 systemd[1]: Started session-8.scope. May 10 00:45:22.272000 audit[3118]: USER_START pid=3118 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:22.276000 audit[3143]: CRED_ACQ pid=3143 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:22.562439 sshd[3118]: pam_unix(sshd:session): session closed for user core May 10 00:45:22.562000 audit[3118]: USER_END pid=3118 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:22.563000 audit[3118]: CRED_DISP pid=3118 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:22.568624 systemd-logind[1176]: Session 8 logged out. Waiting for processes to exit. May 10 00:45:22.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-143.198.48.176:22-139.178.68.195:38064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:22.570719 systemd[1]: sshd@7-143.198.48.176:22-139.178.68.195:38064.service: Deactivated successfully. May 10 00:45:22.572209 systemd[1]: session-8.scope: Deactivated successfully. May 10 00:45:22.574035 systemd-logind[1176]: Removed session 8. May 10 00:45:22.945000 audit[3206]: AVC avc: denied { write } for pid=3206 comm="tee" name="fd" dev="proc" ino=24035 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:45:22.945000 audit[3206]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde2a97a09 a2=241 a3=1b6 items=1 ppid=3170 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:22.945000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:45:22.945000 audit: PATH item=0 name="/dev/fd/63" inode=24028 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:22.948000 audit[3207]: AVC avc: denied { write } for pid=3207 comm="tee" name="fd" dev="proc" ino=24039 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:45:22.948000 audit[3207]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeb3d59a09 a2=241 a3=1b6 items=1 ppid=3173 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:22.948000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:45:22.948000 audit: PATH item=0 name="/dev/fd/63" inode=24027 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:22.945000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:45:22.948000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:45:22.984000 audit[3213]: AVC avc: denied { write } for pid=3213 comm="tee" name="fd" dev="proc" ino=25127 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:45:22.984000 audit[3213]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd20cd6a09 a2=241 a3=1b6 items=1 ppid=3166 pid=3213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:22.984000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:45:22.984000 audit: PATH item=0 name="/dev/fd/63" inode=24041 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:22.984000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:45:22.990000 audit[3226]: AVC avc: denied { write } for pid=3226 comm="tee" name="fd" dev="proc" ino=24052 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:45:22.994000 audit[3215]: AVC avc: denied { write } for pid=3215 comm="tee" name="fd" dev="proc" ino=24056 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:45:22.994000 audit[3215]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc5c4509fa a2=241 a3=1b6 items=1 ppid=3172 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:23.000000 audit[3217]: AVC avc: denied { write } for pid=3217 comm="tee" name="fd" dev="proc" ino=24061 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:45:23.000000 audit[3217]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb6809a0a a2=241 a3=1b6 items=1 ppid=3162 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:23.000000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:45:22.990000 audit[3226]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe4b0609f9 a2=241 a3=1b6 items=1 ppid=3174 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:22.990000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:45:22.990000 audit: PATH item=0 name="/dev/fd/63" inode=24047 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:22.990000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:45:22.994000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:45:22.994000 audit: PATH item=0 name="/dev/fd/63" inode=24042 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:22.994000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:45:23.000000 audit: PATH item=0 name="/dev/fd/63" inode=25123 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:23.000000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:45:23.023000 audit[3230]: AVC avc: denied { write } for pid=3230 comm="tee" name="fd" dev="proc" ino=24064 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:45:23.023000 audit[3230]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb52d5a0b a2=241 a3=1b6 items=1 ppid=3164 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:23.023000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:45:23.023000 audit: PATH item=0 name="/dev/fd/63" inode=25129 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:23.023000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:45:23.812534 env[1184]: time="2025-05-10T00:45:23.808036048Z" level=info msg="StopPodSandbox for \"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\"" May 10 00:45:24.144838 env[1184]: 2025-05-10 00:45:23.909 [INFO][3261] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" May 10 00:45:24.144838 env[1184]: 2025-05-10 00:45:23.911 [INFO][3261] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" iface="eth0" netns="/var/run/netns/cni-055ce2dc-020e-397c-7655-52077622c851" May 10 00:45:24.144838 env[1184]: 2025-05-10 00:45:23.912 [INFO][3261] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" iface="eth0" netns="/var/run/netns/cni-055ce2dc-020e-397c-7655-52077622c851" May 10 00:45:24.144838 env[1184]: 2025-05-10 00:45:23.913 [INFO][3261] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" iface="eth0" netns="/var/run/netns/cni-055ce2dc-020e-397c-7655-52077622c851" May 10 00:45:24.144838 env[1184]: 2025-05-10 00:45:23.913 [INFO][3261] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" May 10 00:45:24.144838 env[1184]: 2025-05-10 00:45:23.913 [INFO][3261] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" May 10 00:45:24.144838 env[1184]: 2025-05-10 00:45:24.110 [INFO][3271] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" HandleID="k8s-pod-network.142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" Workload="ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0" May 10 00:45:24.144838 env[1184]: 2025-05-10 00:45:24.111 [INFO][3271] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:24.144838 env[1184]: 2025-05-10 00:45:24.112 [INFO][3271] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:24.144838 env[1184]: 2025-05-10 00:45:24.134 [WARNING][3271] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" HandleID="k8s-pod-network.142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" Workload="ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0" May 10 00:45:24.144838 env[1184]: 2025-05-10 00:45:24.134 [INFO][3271] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" HandleID="k8s-pod-network.142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" Workload="ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0" May 10 00:45:24.144838 env[1184]: 2025-05-10 00:45:24.138 [INFO][3271] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:24.144838 env[1184]: 2025-05-10 00:45:24.141 [INFO][3261] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" May 10 00:45:24.151048 env[1184]: time="2025-05-10T00:45:24.150797929Z" level=info msg="TearDown network for sandbox \"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\" successfully" May 10 00:45:24.151368 env[1184]: time="2025-05-10T00:45:24.151312686Z" level=info msg="StopPodSandbox for \"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\" returns successfully" May 10 00:45:24.151392 systemd[1]: run-netns-cni\x2d055ce2dc\x2d020e\x2d397c\x2d7655\x2d52077622c851.mount: Deactivated successfully. May 10 00:45:24.157163 env[1184]: time="2025-05-10T00:45:24.157096653Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-84rrs,Uid:2b9a7249-2bd8-45a6-8253-10147c8c745b,Namespace:calico-system,Attempt:1,}" May 10 00:45:24.248478 kubelet[2019]: I0510 00:45:24.248364 2019 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:45:24.252254 kubelet[2019]: E0510 00:45:24.251582 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:24.544497 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:45:24.545048 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali83d0c40d76c: link becomes ready May 10 00:45:24.541840 systemd-networkd[1002]: cali83d0c40d76c: Link UP May 10 00:45:24.544778 systemd-networkd[1002]: cali83d0c40d76c: Gained carrier May 10 00:45:24.588376 env[1184]: 2025-05-10 00:45:24.231 [INFO][3283] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 10 00:45:24.588376 env[1184]: 2025-05-10 00:45:24.256 [INFO][3283] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0 csi-node-driver- calico-system 2b9a7249-2bd8-45a6-8253-10147c8c745b 860 0 2025-05-10 00:44:58 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.7-n-3080830dac csi-node-driver-84rrs eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali83d0c40d76c [] []}} ContainerID="2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2" Namespace="calico-system" Pod="csi-node-driver-84rrs" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-" May 10 00:45:24.588376 env[1184]: 2025-05-10 00:45:24.257 [INFO][3283] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2" Namespace="calico-system" Pod="csi-node-driver-84rrs" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0" May 10 00:45:24.588376 env[1184]: 2025-05-10 00:45:24.372 [INFO][3298] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2" HandleID="k8s-pod-network.2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2" Workload="ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0" May 10 00:45:24.588376 env[1184]: 2025-05-10 00:45:24.426 [INFO][3298] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2" HandleID="k8s-pod-network.2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2" Workload="ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000314a40), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-3080830dac", "pod":"csi-node-driver-84rrs", "timestamp":"2025-05-10 00:45:24.372187226 +0000 UTC"}, Hostname:"ci-3510.3.7-n-3080830dac", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:45:24.588376 env[1184]: 2025-05-10 00:45:24.426 [INFO][3298] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:24.588376 env[1184]: 2025-05-10 00:45:24.427 [INFO][3298] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:24.588376 env[1184]: 2025-05-10 00:45:24.427 [INFO][3298] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-3080830dac' May 10 00:45:24.588376 env[1184]: 2025-05-10 00:45:24.432 [INFO][3298] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2" host="ci-3510.3.7-n-3080830dac" May 10 00:45:24.588376 env[1184]: 2025-05-10 00:45:24.451 [INFO][3298] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-3080830dac" May 10 00:45:24.588376 env[1184]: 2025-05-10 00:45:24.463 [INFO][3298] ipam/ipam.go 489: Trying affinity for 192.168.54.192/26 host="ci-3510.3.7-n-3080830dac" May 10 00:45:24.588376 env[1184]: 2025-05-10 00:45:24.468 [INFO][3298] ipam/ipam.go 155: Attempting to load block cidr=192.168.54.192/26 host="ci-3510.3.7-n-3080830dac" May 10 00:45:24.588376 env[1184]: 2025-05-10 00:45:24.474 [INFO][3298] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.192/26 host="ci-3510.3.7-n-3080830dac" May 10 00:45:24.588376 env[1184]: 2025-05-10 00:45:24.474 [INFO][3298] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.192/26 handle="k8s-pod-network.2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2" host="ci-3510.3.7-n-3080830dac" May 10 00:45:24.588376 env[1184]: 2025-05-10 00:45:24.480 [INFO][3298] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2 May 10 00:45:24.588376 env[1184]: 2025-05-10 00:45:24.488 [INFO][3298] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.54.192/26 handle="k8s-pod-network.2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2" host="ci-3510.3.7-n-3080830dac" May 10 00:45:24.588376 env[1184]: 2025-05-10 00:45:24.501 [INFO][3298] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.54.193/26] block=192.168.54.192/26 handle="k8s-pod-network.2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2" host="ci-3510.3.7-n-3080830dac" May 10 00:45:24.588376 env[1184]: 2025-05-10 00:45:24.501 [INFO][3298] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.193/26] handle="k8s-pod-network.2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2" host="ci-3510.3.7-n-3080830dac" May 10 00:45:24.588376 env[1184]: 2025-05-10 00:45:24.501 [INFO][3298] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:24.588376 env[1184]: 2025-05-10 00:45:24.501 [INFO][3298] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.54.193/26] IPv6=[] ContainerID="2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2" HandleID="k8s-pod-network.2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2" Workload="ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0" May 10 00:45:24.589654 env[1184]: 2025-05-10 00:45:24.507 [INFO][3283] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2" Namespace="calico-system" Pod="csi-node-driver-84rrs" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2b9a7249-2bd8-45a6-8253-10147c8c745b", ResourceVersion:"860", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"", Pod:"csi-node-driver-84rrs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.54.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali83d0c40d76c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:24.589654 env[1184]: 2025-05-10 00:45:24.507 [INFO][3283] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.54.193/32] ContainerID="2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2" Namespace="calico-system" Pod="csi-node-driver-84rrs" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0" May 10 00:45:24.589654 env[1184]: 2025-05-10 00:45:24.507 [INFO][3283] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali83d0c40d76c ContainerID="2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2" Namespace="calico-system" Pod="csi-node-driver-84rrs" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0" May 10 00:45:24.589654 env[1184]: 2025-05-10 00:45:24.549 [INFO][3283] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2" Namespace="calico-system" Pod="csi-node-driver-84rrs" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0" May 10 00:45:24.589654 env[1184]: 2025-05-10 00:45:24.549 [INFO][3283] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2" Namespace="calico-system" Pod="csi-node-driver-84rrs" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2b9a7249-2bd8-45a6-8253-10147c8c745b", ResourceVersion:"860", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2", Pod:"csi-node-driver-84rrs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.54.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali83d0c40d76c", MAC:"4a:38:53:b9:58:7e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:24.589654 env[1184]: 2025-05-10 00:45:24.585 [INFO][3283] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2" Namespace="calico-system" Pod="csi-node-driver-84rrs" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0" May 10 00:45:24.620341 env[1184]: time="2025-05-10T00:45:24.620143483Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:24.620341 env[1184]: time="2025-05-10T00:45:24.620268040Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:24.620663 env[1184]: time="2025-05-10T00:45:24.620305464Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:24.620933 env[1184]: time="2025-05-10T00:45:24.620870861Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2 pid=3329 runtime=io.containerd.runc.v2 May 10 00:45:24.658225 systemd[1]: Started cri-containerd-2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2.scope. May 10 00:45:24.698000 audit[3357]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:24.698000 audit[3357]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff2e652000 a2=0 a3=7fff2e651fec items=0 ppid=2170 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:24.698000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:24.702000 audit[3357]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:24.702000 audit[3357]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff2e652000 a2=0 a3=7fff2e651fec items=0 ppid=2170 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:24.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.708000 audit: BPF prog-id=136 op=LOAD May 10 00:45:24.709000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.709000 audit[3339]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3329 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:24.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233333664613762653464356235616236316463663739313135323265 May 10 00:45:24.709000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.709000 audit[3339]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3329 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:24.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233333664613762653464356235616236316463663739313135323265 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit: BPF prog-id=137 op=LOAD May 10 00:45:24.710000 audit[3339]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002c3ce0 items=0 ppid=3329 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:24.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233333664613762653464356235616236316463663739313135323265 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit: BPF prog-id=138 op=LOAD May 10 00:45:24.710000 audit[3339]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002c3d28 items=0 ppid=3329 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:24.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233333664613762653464356235616236316463663739313135323265 May 10 00:45:24.710000 audit: BPF prog-id=138 op=UNLOAD May 10 00:45:24.710000 audit: BPF prog-id=137 op=UNLOAD May 10 00:45:24.710000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.710000 audit: BPF prog-id=139 op=LOAD May 10 00:45:24.710000 audit[3339]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00032a138 items=0 ppid=3329 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:24.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233333664613762653464356235616236316463663739313135323265 May 10 00:45:24.702000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:24.754774 env[1184]: time="2025-05-10T00:45:24.753237313Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-84rrs,Uid:2b9a7249-2bd8-45a6-8253-10147c8c745b,Namespace:calico-system,Attempt:1,} returns sandbox id \"2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2\"" May 10 00:45:24.759757 env[1184]: time="2025-05-10T00:45:24.759671022Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 10 00:45:25.150973 systemd[1]: run-containerd-runc-k8s.io-2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2-runc.Ffu2HQ.mount: Deactivated successfully. May 10 00:45:25.200086 kubelet[2019]: E0510 00:45:25.199957 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:25.604000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.604000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.604000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.604000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.604000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.604000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.604000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.604000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.604000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.604000 audit: BPF prog-id=140 op=LOAD May 10 00:45:25.604000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff2df5a6d0 a2=98 a3=3 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.604000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:25.606000 audit: BPF prog-id=140 op=UNLOAD May 10 00:45:25.608000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.608000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.608000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.608000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.608000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.608000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.608000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.608000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.608000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.608000 audit: BPF prog-id=141 op=LOAD May 10 00:45:25.608000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff2df5a4b0 a2=74 a3=540051 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.608000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:25.609000 audit: BPF prog-id=141 op=UNLOAD May 10 00:45:25.609000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.609000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.609000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.609000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.609000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.609000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.609000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.609000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.609000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.609000 audit: BPF prog-id=142 op=LOAD May 10 00:45:25.609000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff2df5a4e0 a2=94 a3=2 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.609000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:25.610000 audit: BPF prog-id=142 op=UNLOAD May 10 00:45:25.806752 env[1184]: time="2025-05-10T00:45:25.806652018Z" level=info msg="StopPodSandbox for \"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\"" May 10 00:45:25.807514 env[1184]: time="2025-05-10T00:45:25.807331128Z" level=info msg="StopPodSandbox for \"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\"" May 10 00:45:25.807908 env[1184]: time="2025-05-10T00:45:25.807781474Z" level=info msg="StopPodSandbox for \"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\"" May 10 00:45:25.808683 env[1184]: time="2025-05-10T00:45:25.808215779Z" level=info msg="StopPodSandbox for \"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\"" May 10 00:45:25.953528 kernel: kauditd_printk_skb: 181 callbacks suppressed May 10 00:45:25.953806 kernel: audit: type=1400 audit(1746837925.947:992): avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.947000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.947000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.957863 kernel: audit: type=1400 audit(1746837925.947:992): avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.947000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.960757 kernel: audit: type=1400 audit(1746837925.947:992): avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.947000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.967829 kernel: audit: type=1400 audit(1746837925.947:992): avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.947000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.972840 kernel: audit: type=1400 audit(1746837925.947:992): avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.947000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.978845 kernel: audit: type=1400 audit(1746837925.947:992): avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.947000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.984899 kernel: audit: type=1400 audit(1746837925.947:992): avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.947000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.989854 kernel: audit: type=1400 audit(1746837925.947:992): avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.947000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.995886 kernel: audit: type=1400 audit(1746837925.947:992): avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.947000 audit: BPF prog-id=143 op=LOAD May 10 00:45:25.947000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff2df5a3a0 a2=40 a3=1 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.000779 kernel: audit: type=1334 audit(1746837925.947:992): prog-id=143 op=LOAD May 10 00:45:25.947000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:25.959000 audit: BPF prog-id=143 op=UNLOAD May 10 00:45:25.959000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.959000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff2df5a470 a2=50 a3=7fff2df5a550 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.959000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:26.001000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.001000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff2df5a3b0 a2=28 a3=0 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.001000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:26.001000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.001000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff2df5a3e0 a2=28 a3=0 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.001000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:26.001000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.001000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff2df5a2f0 a2=28 a3=0 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.001000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:26.001000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.001000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff2df5a400 a2=28 a3=0 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.001000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:26.001000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.001000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff2df5a3e0 a2=28 a3=0 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.001000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:26.001000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.001000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff2df5a3d0 a2=28 a3=0 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.001000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:26.001000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.001000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff2df5a400 a2=28 a3=0 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.001000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:26.001000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.001000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff2df5a3e0 a2=28 a3=0 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.001000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:26.001000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.001000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff2df5a400 a2=28 a3=0 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.001000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:26.001000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.001000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff2df5a3d0 a2=28 a3=0 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.001000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:26.001000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.001000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff2df5a440 a2=28 a3=0 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.001000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:26.034000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff2df5a1f0 a2=50 a3=1 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:26.034000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit: BPF prog-id=144 op=LOAD May 10 00:45:26.034000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff2df5a1f0 a2=94 a3=5 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:26.034000 audit: BPF prog-id=144 op=UNLOAD May 10 00:45:26.034000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff2df5a2a0 a2=50 a3=1 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:26.034000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff2df5a3c0 a2=4 a3=38 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:26.034000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.034000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:45:26.034000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff2df5a410 a2=94 a3=6 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:26.045000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.045000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.045000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.045000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.045000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.045000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.045000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.045000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.045000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.045000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.045000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:45:26.045000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff2df59bc0 a2=94 a3=83 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.045000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:26.046000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.046000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.046000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.046000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.046000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.046000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.046000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.046000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.046000 audit[3417]: AVC avc: denied { perfmon } for pid=3417 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.046000 audit[3417]: AVC avc: denied { bpf } for pid=3417 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.046000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:45:26.046000 audit[3417]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff2df59bc0 a2=94 a3=83 items=0 ppid=3395 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.046000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:26.042103 systemd-networkd[1002]: cali83d0c40d76c: Gained IPv6LL May 10 00:45:26.289000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit: BPF prog-id=145 op=LOAD May 10 00:45:26.289000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff76247340 a2=98 a3=1999999999999999 items=0 ppid=3395 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.289000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:45:26.289000 audit: BPF prog-id=145 op=UNLOAD May 10 00:45:26.289000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit: BPF prog-id=146 op=LOAD May 10 00:45:26.289000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff76247220 a2=74 a3=ffff items=0 ppid=3395 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.289000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:45:26.289000 audit: BPF prog-id=146 op=UNLOAD May 10 00:45:26.289000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.289000 audit: BPF prog-id=147 op=LOAD May 10 00:45:26.289000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff76247260 a2=40 a3=7fff76247440 items=0 ppid=3395 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.289000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:45:26.289000 audit: BPF prog-id=147 op=UNLOAD May 10 00:45:26.345510 env[1184]: 2025-05-10 00:45:26.052 [INFO][3456] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" May 10 00:45:26.345510 env[1184]: 2025-05-10 00:45:26.052 [INFO][3456] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" iface="eth0" netns="/var/run/netns/cni-86cb3410-5ba1-6a18-8077-2923fb84fd6f" May 10 00:45:26.345510 env[1184]: 2025-05-10 00:45:26.052 [INFO][3456] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" iface="eth0" netns="/var/run/netns/cni-86cb3410-5ba1-6a18-8077-2923fb84fd6f" May 10 00:45:26.345510 env[1184]: 2025-05-10 00:45:26.053 [INFO][3456] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" iface="eth0" netns="/var/run/netns/cni-86cb3410-5ba1-6a18-8077-2923fb84fd6f" May 10 00:45:26.345510 env[1184]: 2025-05-10 00:45:26.053 [INFO][3456] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" May 10 00:45:26.345510 env[1184]: 2025-05-10 00:45:26.053 [INFO][3456] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" May 10 00:45:26.345510 env[1184]: 2025-05-10 00:45:26.310 [INFO][3496] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" HandleID="k8s-pod-network.dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0" May 10 00:45:26.345510 env[1184]: 2025-05-10 00:45:26.314 [INFO][3496] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:26.345510 env[1184]: 2025-05-10 00:45:26.314 [INFO][3496] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:26.345510 env[1184]: 2025-05-10 00:45:26.329 [WARNING][3496] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" HandleID="k8s-pod-network.dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0" May 10 00:45:26.345510 env[1184]: 2025-05-10 00:45:26.329 [INFO][3496] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" HandleID="k8s-pod-network.dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0" May 10 00:45:26.345510 env[1184]: 2025-05-10 00:45:26.333 [INFO][3496] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:26.345510 env[1184]: 2025-05-10 00:45:26.339 [INFO][3456] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" May 10 00:45:26.356278 systemd[1]: run-netns-cni\x2d86cb3410\x2d5ba1\x2d6a18\x2d8077\x2d2923fb84fd6f.mount: Deactivated successfully. May 10 00:45:26.360017 env[1184]: time="2025-05-10T00:45:26.359863343Z" level=info msg="TearDown network for sandbox \"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\" successfully" May 10 00:45:26.360392 env[1184]: time="2025-05-10T00:45:26.360345386Z" level=info msg="StopPodSandbox for \"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\" returns successfully" May 10 00:45:26.364086 kubelet[2019]: E0510 00:45:26.363406 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:26.372526 env[1184]: time="2025-05-10T00:45:26.372453699Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-w2pfg,Uid:096fc47e-332e-45a4-ba28-0d240852b6c0,Namespace:kube-system,Attempt:1,}" May 10 00:45:26.480419 env[1184]: 2025-05-10 00:45:26.195 [INFO][3477] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" May 10 00:45:26.480419 env[1184]: 2025-05-10 00:45:26.195 [INFO][3477] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" iface="eth0" netns="/var/run/netns/cni-11c37c3d-b488-b3dc-c37e-88ccdea47cd6" May 10 00:45:26.480419 env[1184]: 2025-05-10 00:45:26.196 [INFO][3477] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" iface="eth0" netns="/var/run/netns/cni-11c37c3d-b488-b3dc-c37e-88ccdea47cd6" May 10 00:45:26.480419 env[1184]: 2025-05-10 00:45:26.199 [INFO][3477] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" iface="eth0" netns="/var/run/netns/cni-11c37c3d-b488-b3dc-c37e-88ccdea47cd6" May 10 00:45:26.480419 env[1184]: 2025-05-10 00:45:26.199 [INFO][3477] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" May 10 00:45:26.480419 env[1184]: 2025-05-10 00:45:26.199 [INFO][3477] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" May 10 00:45:26.480419 env[1184]: 2025-05-10 00:45:26.392 [INFO][3514] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" HandleID="k8s-pod-network.9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0" May 10 00:45:26.480419 env[1184]: 2025-05-10 00:45:26.392 [INFO][3514] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:26.480419 env[1184]: 2025-05-10 00:45:26.392 [INFO][3514] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:26.480419 env[1184]: 2025-05-10 00:45:26.459 [WARNING][3514] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" HandleID="k8s-pod-network.9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0" May 10 00:45:26.480419 env[1184]: 2025-05-10 00:45:26.459 [INFO][3514] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" HandleID="k8s-pod-network.9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0" May 10 00:45:26.480419 env[1184]: 2025-05-10 00:45:26.468 [INFO][3514] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:26.480419 env[1184]: 2025-05-10 00:45:26.475 [INFO][3477] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" May 10 00:45:26.490304 env[1184]: time="2025-05-10T00:45:26.480688414Z" level=info msg="TearDown network for sandbox \"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\" successfully" May 10 00:45:26.490304 env[1184]: time="2025-05-10T00:45:26.480764403Z" level=info msg="StopPodSandbox for \"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\" returns successfully" May 10 00:45:26.487253 systemd[1]: run-netns-cni\x2d11c37c3d\x2db488\x2db3dc\x2dc37e\x2d88ccdea47cd6.mount: Deactivated successfully. May 10 00:45:26.491511 env[1184]: time="2025-05-10T00:45:26.491463256Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59f5cd6df4-k8vdw,Uid:131c747f-d395-4c4b-8559-06ad886de3fa,Namespace:calico-apiserver,Attempt:1,}" May 10 00:45:26.528449 env[1184]: 2025-05-10 00:45:26.114 [INFO][3469] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" May 10 00:45:26.528449 env[1184]: 2025-05-10 00:45:26.115 [INFO][3469] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" iface="eth0" netns="/var/run/netns/cni-000f3f19-5eac-8d78-544e-11cc790be968" May 10 00:45:26.528449 env[1184]: 2025-05-10 00:45:26.115 [INFO][3469] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" iface="eth0" netns="/var/run/netns/cni-000f3f19-5eac-8d78-544e-11cc790be968" May 10 00:45:26.528449 env[1184]: 2025-05-10 00:45:26.115 [INFO][3469] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" iface="eth0" netns="/var/run/netns/cni-000f3f19-5eac-8d78-544e-11cc790be968" May 10 00:45:26.528449 env[1184]: 2025-05-10 00:45:26.116 [INFO][3469] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" May 10 00:45:26.528449 env[1184]: 2025-05-10 00:45:26.116 [INFO][3469] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" May 10 00:45:26.528449 env[1184]: 2025-05-10 00:45:26.437 [INFO][3504] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" HandleID="k8s-pod-network.b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0" May 10 00:45:26.528449 env[1184]: 2025-05-10 00:45:26.437 [INFO][3504] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:26.528449 env[1184]: 2025-05-10 00:45:26.468 [INFO][3504] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:26.528449 env[1184]: 2025-05-10 00:45:26.491 [WARNING][3504] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" HandleID="k8s-pod-network.b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0" May 10 00:45:26.528449 env[1184]: 2025-05-10 00:45:26.491 [INFO][3504] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" HandleID="k8s-pod-network.b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0" May 10 00:45:26.528449 env[1184]: 2025-05-10 00:45:26.498 [INFO][3504] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:26.528449 env[1184]: 2025-05-10 00:45:26.505 [INFO][3469] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" May 10 00:45:26.534004 env[1184]: time="2025-05-10T00:45:26.533899885Z" level=info msg="TearDown network for sandbox \"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\" successfully" May 10 00:45:26.534004 env[1184]: time="2025-05-10T00:45:26.533969025Z" level=info msg="StopPodSandbox for \"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\" returns successfully" May 10 00:45:26.535039 kubelet[2019]: E0510 00:45:26.534983 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:26.536346 env[1184]: time="2025-05-10T00:45:26.536288037Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-g6mxn,Uid:23cdbc27-8426-4777-969e-b9508b2b58c7,Namespace:kube-system,Attempt:1,}" May 10 00:45:26.597370 systemd-networkd[1002]: vxlan.calico: Link UP May 10 00:45:26.597382 systemd-networkd[1002]: vxlan.calico: Gained carrier May 10 00:45:26.602996 env[1184]: 2025-05-10 00:45:26.198 [INFO][3481] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" May 10 00:45:26.602996 env[1184]: 2025-05-10 00:45:26.198 [INFO][3481] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" iface="eth0" netns="/var/run/netns/cni-e2d9d701-7286-0c76-c7d4-8e57e6ef24d1" May 10 00:45:26.602996 env[1184]: 2025-05-10 00:45:26.199 [INFO][3481] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" iface="eth0" netns="/var/run/netns/cni-e2d9d701-7286-0c76-c7d4-8e57e6ef24d1" May 10 00:45:26.602996 env[1184]: 2025-05-10 00:45:26.199 [INFO][3481] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" iface="eth0" netns="/var/run/netns/cni-e2d9d701-7286-0c76-c7d4-8e57e6ef24d1" May 10 00:45:26.602996 env[1184]: 2025-05-10 00:45:26.199 [INFO][3481] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" May 10 00:45:26.602996 env[1184]: 2025-05-10 00:45:26.199 [INFO][3481] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" May 10 00:45:26.602996 env[1184]: 2025-05-10 00:45:26.473 [INFO][3515] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" HandleID="k8s-pod-network.82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0" May 10 00:45:26.602996 env[1184]: 2025-05-10 00:45:26.473 [INFO][3515] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:26.602996 env[1184]: 2025-05-10 00:45:26.504 [INFO][3515] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:26.602996 env[1184]: 2025-05-10 00:45:26.543 [WARNING][3515] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" HandleID="k8s-pod-network.82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0" May 10 00:45:26.602996 env[1184]: 2025-05-10 00:45:26.543 [INFO][3515] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" HandleID="k8s-pod-network.82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0" May 10 00:45:26.602996 env[1184]: 2025-05-10 00:45:26.553 [INFO][3515] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:26.602996 env[1184]: 2025-05-10 00:45:26.560 [INFO][3481] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" May 10 00:45:26.615679 env[1184]: time="2025-05-10T00:45:26.615599861Z" level=info msg="TearDown network for sandbox \"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\" successfully" May 10 00:45:26.615976 env[1184]: time="2025-05-10T00:45:26.615933185Z" level=info msg="StopPodSandbox for \"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\" returns successfully" May 10 00:45:26.625801 env[1184]: time="2025-05-10T00:45:26.625667724Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59f5cd6df4-9cds2,Uid:92e30503-0699-4ea6-bf79-a0a97419537f,Namespace:calico-apiserver,Attempt:1,}" May 10 00:45:26.643000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.643000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.643000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.643000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.643000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.643000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.643000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.643000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.643000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.643000 audit: BPF prog-id=148 op=LOAD May 10 00:45:26.643000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdbbfcaba0 a2=98 a3=ffffffff items=0 ppid=3395 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.643000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:26.644000 audit: BPF prog-id=148 op=UNLOAD May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit: BPF prog-id=149 op=LOAD May 10 00:45:26.645000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdbbfca9b0 a2=74 a3=540051 items=0 ppid=3395 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.645000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:26.645000 audit: BPF prog-id=149 op=UNLOAD May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit: BPF prog-id=150 op=LOAD May 10 00:45:26.645000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdbbfca9e0 a2=94 a3=2 items=0 ppid=3395 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.645000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:26.645000 audit: BPF prog-id=150 op=UNLOAD May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdbbfca8b0 a2=28 a3=0 items=0 ppid=3395 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.645000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdbbfca8e0 a2=28 a3=0 items=0 ppid=3395 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.645000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdbbfca7f0 a2=28 a3=0 items=0 ppid=3395 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.645000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdbbfca900 a2=28 a3=0 items=0 ppid=3395 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.645000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdbbfca8e0 a2=28 a3=0 items=0 ppid=3395 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.645000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdbbfca8d0 a2=28 a3=0 items=0 ppid=3395 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.645000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdbbfca900 a2=28 a3=0 items=0 ppid=3395 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.645000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdbbfca8e0 a2=28 a3=0 items=0 ppid=3395 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.645000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdbbfca900 a2=28 a3=0 items=0 ppid=3395 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.645000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdbbfca8d0 a2=28 a3=0 items=0 ppid=3395 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.645000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdbbfca940 a2=28 a3=0 items=0 ppid=3395 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.645000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.645000 audit: BPF prog-id=151 op=LOAD May 10 00:45:26.645000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdbbfca7b0 a2=40 a3=0 items=0 ppid=3395 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.645000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:26.646000 audit: BPF prog-id=151 op=UNLOAD May 10 00:45:26.647000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffdbbfca7a0 a2=50 a3=2800 items=0 ppid=3395 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.647000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:26.647000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffdbbfca7a0 a2=50 a3=2800 items=0 ppid=3395 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.647000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:26.647000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit: BPF prog-id=152 op=LOAD May 10 00:45:26.647000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdbbfc9fc0 a2=94 a3=2 items=0 ppid=3395 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.647000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:26.647000 audit: BPF prog-id=152 op=UNLOAD May 10 00:45:26.647000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit[3579]: AVC avc: denied { perfmon } for pid=3579 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit[3579]: AVC avc: denied { bpf } for pid=3579 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.647000 audit: BPF prog-id=153 op=LOAD May 10 00:45:26.647000 audit[3579]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdbbfca0c0 a2=94 a3=30 items=0 ppid=3395 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.647000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:26.652000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.652000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.652000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.652000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.652000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.652000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.652000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.652000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.652000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.652000 audit: BPF prog-id=154 op=LOAD May 10 00:45:26.652000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee72733f0 a2=98 a3=0 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:26.656000 audit: BPF prog-id=154 op=UNLOAD May 10 00:45:26.656000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.656000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.656000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.656000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.656000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.656000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.656000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.656000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.656000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.656000 audit: BPF prog-id=155 op=LOAD May 10 00:45:26.656000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee72731d0 a2=74 a3=540051 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.656000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:26.656000 audit: BPF prog-id=155 op=UNLOAD May 10 00:45:26.656000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.656000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.656000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.656000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.656000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.656000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.656000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.656000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.656000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.656000 audit: BPF prog-id=156 op=LOAD May 10 00:45:26.656000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee7273200 a2=94 a3=2 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.656000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:26.656000 audit: BPF prog-id=156 op=UNLOAD May 10 00:45:26.994000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.994000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.994000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.994000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.994000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.994000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.994000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.994000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.994000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.994000 audit: BPF prog-id=157 op=LOAD May 10 00:45:26.994000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee72730c0 a2=40 a3=1 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.994000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:26.994000 audit: BPF prog-id=157 op=UNLOAD May 10 00:45:26.994000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:26.994000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffee7273190 a2=50 a3=7ffee7273270 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:26.994000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.028000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.028000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee72730d0 a2=28 a3=0 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.028000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.029000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.029000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee7273100 a2=28 a3=0 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.029000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.030000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.030000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee7273010 a2=28 a3=0 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.030000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.030000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.030000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee7273120 a2=28 a3=0 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.030000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.030000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.030000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee7273100 a2=28 a3=0 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.030000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.030000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.030000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee72730f0 a2=28 a3=0 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.030000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.030000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.030000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee7273120 a2=28 a3=0 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.030000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.030000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.030000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee7273100 a2=28 a3=0 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.030000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.030000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.030000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee7273120 a2=28 a3=0 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.030000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.030000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.030000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee72730f0 a2=28 a3=0 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.030000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.030000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.030000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee7273160 a2=28 a3=0 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.030000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffee7272f10 a2=50 a3=1 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.031000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit: BPF prog-id=158 op=LOAD May 10 00:45:27.031000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee7272f10 a2=94 a3=5 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.031000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.031000 audit: BPF prog-id=158 op=UNLOAD May 10 00:45:27.031000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffee7272fc0 a2=50 a3=1 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.031000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffee72730e0 a2=4 a3=38 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.031000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.031000 audit[3581]: AVC avc: denied { confidentiality } for pid=3581 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:45:27.031000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffee7273130 a2=94 a3=6 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.031000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { confidentiality } for pid=3581 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:45:27.032000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffee72728e0 a2=94 a3=83 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.032000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.032000 audit[3581]: AVC avc: denied { confidentiality } for pid=3581 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:45:27.032000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffee72728e0 a2=94 a3=83 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.032000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.033000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.033000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffee7274320 a2=10 a3=f1f00800 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.033000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.034000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.034000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffee72741c0 a2=10 a3=3 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.034000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.034000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffee7274160 a2=10 a3=3 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.034000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.034000 audit[3581]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffee7274160 a2=10 a3=7 items=0 ppid=3395 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:27.048000 audit: BPF prog-id=153 op=UNLOAD May 10 00:45:27.134916 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali18c983a7d40: link becomes ready May 10 00:45:27.135290 systemd-networkd[1002]: cali18c983a7d40: Link UP May 10 00:45:27.135660 systemd-networkd[1002]: cali18c983a7d40: Gained carrier May 10 00:45:27.164853 env[1184]: 2025-05-10 00:45:26.772 [INFO][3582] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0 coredns-7db6d8ff4d- kube-system 23cdbc27-8426-4777-969e-b9508b2b58c7 891 0 2025-05-10 00:44:52 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-3080830dac coredns-7db6d8ff4d-g6mxn eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali18c983a7d40 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473" Namespace="kube-system" Pod="coredns-7db6d8ff4d-g6mxn" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-" May 10 00:45:27.164853 env[1184]: 2025-05-10 00:45:26.772 [INFO][3582] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473" Namespace="kube-system" Pod="coredns-7db6d8ff4d-g6mxn" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0" May 10 00:45:27.164853 env[1184]: 2025-05-10 00:45:26.993 [INFO][3599] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473" HandleID="k8s-pod-network.5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0" May 10 00:45:27.164853 env[1184]: 2025-05-10 00:45:27.025 [INFO][3599] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473" HandleID="k8s-pod-network.5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002914b0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-3080830dac", "pod":"coredns-7db6d8ff4d-g6mxn", "timestamp":"2025-05-10 00:45:26.993260428 +0000 UTC"}, Hostname:"ci-3510.3.7-n-3080830dac", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:45:27.164853 env[1184]: 2025-05-10 00:45:27.025 [INFO][3599] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:27.164853 env[1184]: 2025-05-10 00:45:27.026 [INFO][3599] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:27.164853 env[1184]: 2025-05-10 00:45:27.026 [INFO][3599] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-3080830dac' May 10 00:45:27.164853 env[1184]: 2025-05-10 00:45:27.033 [INFO][3599] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473" host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.164853 env[1184]: 2025-05-10 00:45:27.055 [INFO][3599] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.164853 env[1184]: 2025-05-10 00:45:27.068 [INFO][3599] ipam/ipam.go 489: Trying affinity for 192.168.54.192/26 host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.164853 env[1184]: 2025-05-10 00:45:27.075 [INFO][3599] ipam/ipam.go 155: Attempting to load block cidr=192.168.54.192/26 host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.164853 env[1184]: 2025-05-10 00:45:27.082 [INFO][3599] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.192/26 host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.164853 env[1184]: 2025-05-10 00:45:27.082 [INFO][3599] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.192/26 handle="k8s-pod-network.5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473" host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.164853 env[1184]: 2025-05-10 00:45:27.087 [INFO][3599] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473 May 10 00:45:27.164853 env[1184]: 2025-05-10 00:45:27.099 [INFO][3599] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.54.192/26 handle="k8s-pod-network.5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473" host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.164853 env[1184]: 2025-05-10 00:45:27.117 [INFO][3599] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.54.194/26] block=192.168.54.192/26 handle="k8s-pod-network.5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473" host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.164853 env[1184]: 2025-05-10 00:45:27.117 [INFO][3599] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.194/26] handle="k8s-pod-network.5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473" host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.164853 env[1184]: 2025-05-10 00:45:27.118 [INFO][3599] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:27.164853 env[1184]: 2025-05-10 00:45:27.118 [INFO][3599] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.54.194/26] IPv6=[] ContainerID="5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473" HandleID="k8s-pod-network.5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0" May 10 00:45:27.166049 env[1184]: 2025-05-10 00:45:27.121 [INFO][3582] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473" Namespace="kube-system" Pod="coredns-7db6d8ff4d-g6mxn" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"23cdbc27-8426-4777-969e-b9508b2b58c7", ResourceVersion:"891", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"", Pod:"coredns-7db6d8ff4d-g6mxn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali18c983a7d40", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:27.166049 env[1184]: 2025-05-10 00:45:27.121 [INFO][3582] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.54.194/32] ContainerID="5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473" Namespace="kube-system" Pod="coredns-7db6d8ff4d-g6mxn" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0" May 10 00:45:27.166049 env[1184]: 2025-05-10 00:45:27.121 [INFO][3582] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali18c983a7d40 ContainerID="5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473" Namespace="kube-system" Pod="coredns-7db6d8ff4d-g6mxn" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0" May 10 00:45:27.166049 env[1184]: 2025-05-10 00:45:27.138 [INFO][3582] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473" Namespace="kube-system" Pod="coredns-7db6d8ff4d-g6mxn" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0" May 10 00:45:27.166049 env[1184]: 2025-05-10 00:45:27.138 [INFO][3582] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473" Namespace="kube-system" Pod="coredns-7db6d8ff4d-g6mxn" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"23cdbc27-8426-4777-969e-b9508b2b58c7", ResourceVersion:"891", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473", Pod:"coredns-7db6d8ff4d-g6mxn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali18c983a7d40", MAC:"56:6e:5f:8b:58:94", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:27.166049 env[1184]: 2025-05-10 00:45:27.161 [INFO][3582] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473" Namespace="kube-system" Pod="coredns-7db6d8ff4d-g6mxn" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0" May 10 00:45:27.261264 env[1184]: time="2025-05-10T00:45:27.254802854Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:27.262656 env[1184]: time="2025-05-10T00:45:27.262499492Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:27.262950 env[1184]: time="2025-05-10T00:45:27.262626648Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:27.265221 env[1184]: time="2025-05-10T00:45:27.263349177Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473 pid=3659 runtime=io.containerd.runc.v2 May 10 00:45:27.326542 systemd[1]: Started cri-containerd-5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473.scope. May 10 00:45:27.329609 systemd-networkd[1002]: calia522b3b8512: Link UP May 10 00:45:27.332267 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia522b3b8512: link becomes ready May 10 00:45:27.331275 systemd-networkd[1002]: calia522b3b8512: Gained carrier May 10 00:45:27.366103 systemd[1]: run-netns-cni\x2de2d9d701\x2d7286\x2d0c76\x2dc7d4\x2d8e57e6ef24d1.mount: Deactivated successfully. May 10 00:45:27.366229 systemd[1]: run-netns-cni\x2d000f3f19\x2d5eac\x2d8d78\x2d544e\x2d11cc790be968.mount: Deactivated successfully. May 10 00:45:27.389715 systemd[1]: run-containerd-runc-k8s.io-5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473-runc.jaCG3u.mount: Deactivated successfully. May 10 00:45:27.402793 env[1184]: 2025-05-10 00:45:26.846 [INFO][3537] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0 coredns-7db6d8ff4d- kube-system 096fc47e-332e-45a4-ba28-0d240852b6c0 890 0 2025-05-10 00:44:52 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-3080830dac coredns-7db6d8ff4d-w2pfg eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia522b3b8512 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-w2pfg" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-" May 10 00:45:27.402793 env[1184]: 2025-05-10 00:45:26.847 [INFO][3537] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-w2pfg" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0" May 10 00:45:27.402793 env[1184]: 2025-05-10 00:45:27.180 [INFO][3614] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3" HandleID="k8s-pod-network.eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0" May 10 00:45:27.402793 env[1184]: 2025-05-10 00:45:27.206 [INFO][3614] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3" HandleID="k8s-pod-network.eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000302a70), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-3080830dac", "pod":"coredns-7db6d8ff4d-w2pfg", "timestamp":"2025-05-10 00:45:27.178769721 +0000 UTC"}, Hostname:"ci-3510.3.7-n-3080830dac", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:45:27.402793 env[1184]: 2025-05-10 00:45:27.207 [INFO][3614] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:27.402793 env[1184]: 2025-05-10 00:45:27.207 [INFO][3614] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:27.402793 env[1184]: 2025-05-10 00:45:27.207 [INFO][3614] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-3080830dac' May 10 00:45:27.402793 env[1184]: 2025-05-10 00:45:27.211 [INFO][3614] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3" host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.402793 env[1184]: 2025-05-10 00:45:27.239 [INFO][3614] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.402793 env[1184]: 2025-05-10 00:45:27.262 [INFO][3614] ipam/ipam.go 489: Trying affinity for 192.168.54.192/26 host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.402793 env[1184]: 2025-05-10 00:45:27.268 [INFO][3614] ipam/ipam.go 155: Attempting to load block cidr=192.168.54.192/26 host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.402793 env[1184]: 2025-05-10 00:45:27.273 [INFO][3614] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.192/26 host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.402793 env[1184]: 2025-05-10 00:45:27.273 [INFO][3614] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.192/26 handle="k8s-pod-network.eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3" host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.402793 env[1184]: 2025-05-10 00:45:27.277 [INFO][3614] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3 May 10 00:45:27.402793 env[1184]: 2025-05-10 00:45:27.287 [INFO][3614] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.54.192/26 handle="k8s-pod-network.eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3" host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.402793 env[1184]: 2025-05-10 00:45:27.299 [INFO][3614] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.54.195/26] block=192.168.54.192/26 handle="k8s-pod-network.eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3" host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.402793 env[1184]: 2025-05-10 00:45:27.299 [INFO][3614] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.195/26] handle="k8s-pod-network.eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3" host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.402793 env[1184]: 2025-05-10 00:45:27.299 [INFO][3614] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:27.402793 env[1184]: 2025-05-10 00:45:27.299 [INFO][3614] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.54.195/26] IPv6=[] ContainerID="eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3" HandleID="k8s-pod-network.eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0" May 10 00:45:27.404077 env[1184]: 2025-05-10 00:45:27.309 [INFO][3537] cni-plugin/k8s.go 386: Populated endpoint ContainerID="eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-w2pfg" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"096fc47e-332e-45a4-ba28-0d240852b6c0", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"", Pod:"coredns-7db6d8ff4d-w2pfg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia522b3b8512", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:27.404077 env[1184]: 2025-05-10 00:45:27.309 [INFO][3537] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.54.195/32] ContainerID="eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-w2pfg" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0" May 10 00:45:27.404077 env[1184]: 2025-05-10 00:45:27.309 [INFO][3537] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia522b3b8512 ContainerID="eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-w2pfg" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0" May 10 00:45:27.404077 env[1184]: 2025-05-10 00:45:27.345 [INFO][3537] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-w2pfg" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0" May 10 00:45:27.404077 env[1184]: 2025-05-10 00:45:27.345 [INFO][3537] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-w2pfg" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"096fc47e-332e-45a4-ba28-0d240852b6c0", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3", Pod:"coredns-7db6d8ff4d-w2pfg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia522b3b8512", MAC:"fa:db:54:03:ff:ec", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:27.404077 env[1184]: 2025-05-10 00:45:27.397 [INFO][3537] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-w2pfg" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0" May 10 00:45:27.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit: BPF prog-id=159 op=LOAD May 10 00:45:27.431000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3659 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565373762653666646232393361656430383165313630623036306162 May 10 00:45:27.431000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3659 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565373762653666646232393361656430383165313630623036306162 May 10 00:45:27.431000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit: BPF prog-id=160 op=LOAD May 10 00:45:27.431000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003e0670 items=0 ppid=3659 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565373762653666646232393361656430383165313630623036306162 May 10 00:45:27.431000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.431000 audit: BPF prog-id=161 op=LOAD May 10 00:45:27.431000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003e06b8 items=0 ppid=3659 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565373762653666646232393361656430383165313630623036306162 May 10 00:45:27.432000 audit: BPF prog-id=161 op=UNLOAD May 10 00:45:27.432000 audit: BPF prog-id=160 op=UNLOAD May 10 00:45:27.432000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.432000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.432000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.432000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.432000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.432000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.432000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.432000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.432000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.432000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.432000 audit: BPF prog-id=162 op=LOAD May 10 00:45:27.432000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e0ac8 items=0 ppid=3659 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565373762653666646232393361656430383165313630623036306162 May 10 00:45:27.489920 env[1184]: time="2025-05-10T00:45:27.489800785Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:27.490282 env[1184]: time="2025-05-10T00:45:27.490232191Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:27.490481 env[1184]: time="2025-05-10T00:45:27.490447706Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:27.490952 env[1184]: time="2025-05-10T00:45:27.490899264Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3 pid=3722 runtime=io.containerd.runc.v2 May 10 00:45:27.576665 systemd[1]: Started sshd@8-143.198.48.176:22-139.178.68.195:55550.service. May 10 00:45:27.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-143.198.48.176:22-139.178.68.195:55550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:27.595210 systemd[1]: Started cri-containerd-eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3.scope. May 10 00:45:27.619682 systemd-networkd[1002]: cali847218ba571: Link UP May 10 00:45:27.620974 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali847218ba571: link becomes ready May 10 00:45:27.621275 systemd-networkd[1002]: cali847218ba571: Gained carrier May 10 00:45:27.651768 env[1184]: time="2025-05-10T00:45:27.649945591Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-g6mxn,Uid:23cdbc27-8426-4777-969e-b9508b2b58c7,Namespace:kube-system,Attempt:1,} returns sandbox id \"5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473\"" May 10 00:45:27.663967 kubelet[2019]: E0510 00:45:27.656996 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:27.670528 env[1184]: time="2025-05-10T00:45:27.669573284Z" level=info msg="CreateContainer within sandbox \"5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:45:27.648000 audit[3760]: NETFILTER_CFG table=nat:97 family=2 entries=15 op=nft_register_chain pid=3760 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:45:27.648000 audit[3760]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffef2d8e3f0 a2=0 a3=7ffef2d8e3dc items=0 ppid=3395 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.648000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:45:27.702126 env[1184]: 2025-05-10 00:45:26.938 [INFO][3554] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0 calico-apiserver-59f5cd6df4- calico-apiserver 131c747f-d395-4c4b-8559-06ad886de3fa 893 0 2025-05-10 00:44:58 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:59f5cd6df4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-3080830dac calico-apiserver-59f5cd6df4-k8vdw eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali847218ba571 [] []}} ContainerID="01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d" Namespace="calico-apiserver" Pod="calico-apiserver-59f5cd6df4-k8vdw" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-" May 10 00:45:27.702126 env[1184]: 2025-05-10 00:45:26.938 [INFO][3554] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d" Namespace="calico-apiserver" Pod="calico-apiserver-59f5cd6df4-k8vdw" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0" May 10 00:45:27.702126 env[1184]: 2025-05-10 00:45:27.386 [INFO][3622] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d" HandleID="k8s-pod-network.01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0" May 10 00:45:27.702126 env[1184]: 2025-05-10 00:45:27.421 [INFO][3622] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d" HandleID="k8s-pod-network.01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002a8de0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-3080830dac", "pod":"calico-apiserver-59f5cd6df4-k8vdw", "timestamp":"2025-05-10 00:45:27.38655806 +0000 UTC"}, Hostname:"ci-3510.3.7-n-3080830dac", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:45:27.702126 env[1184]: 2025-05-10 00:45:27.421 [INFO][3622] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:27.702126 env[1184]: 2025-05-10 00:45:27.421 [INFO][3622] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:27.702126 env[1184]: 2025-05-10 00:45:27.421 [INFO][3622] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-3080830dac' May 10 00:45:27.702126 env[1184]: 2025-05-10 00:45:27.430 [INFO][3622] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d" host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.702126 env[1184]: 2025-05-10 00:45:27.454 [INFO][3622] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.702126 env[1184]: 2025-05-10 00:45:27.497 [INFO][3622] ipam/ipam.go 489: Trying affinity for 192.168.54.192/26 host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.702126 env[1184]: 2025-05-10 00:45:27.511 [INFO][3622] ipam/ipam.go 155: Attempting to load block cidr=192.168.54.192/26 host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.702126 env[1184]: 2025-05-10 00:45:27.520 [INFO][3622] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.192/26 host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.702126 env[1184]: 2025-05-10 00:45:27.521 [INFO][3622] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.192/26 handle="k8s-pod-network.01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d" host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.702126 env[1184]: 2025-05-10 00:45:27.536 [INFO][3622] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d May 10 00:45:27.702126 env[1184]: 2025-05-10 00:45:27.548 [INFO][3622] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.54.192/26 handle="k8s-pod-network.01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d" host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.702126 env[1184]: 2025-05-10 00:45:27.565 [INFO][3622] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.54.196/26] block=192.168.54.192/26 handle="k8s-pod-network.01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d" host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.702126 env[1184]: 2025-05-10 00:45:27.565 [INFO][3622] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.196/26] handle="k8s-pod-network.01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d" host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.702126 env[1184]: 2025-05-10 00:45:27.565 [INFO][3622] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:27.702126 env[1184]: 2025-05-10 00:45:27.565 [INFO][3622] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.54.196/26] IPv6=[] ContainerID="01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d" HandleID="k8s-pod-network.01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0" May 10 00:45:27.703293 env[1184]: 2025-05-10 00:45:27.587 [INFO][3554] cni-plugin/k8s.go 386: Populated endpoint ContainerID="01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d" Namespace="calico-apiserver" Pod="calico-apiserver-59f5cd6df4-k8vdw" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0", GenerateName:"calico-apiserver-59f5cd6df4-", Namespace:"calico-apiserver", SelfLink:"", UID:"131c747f-d395-4c4b-8559-06ad886de3fa", ResourceVersion:"893", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"59f5cd6df4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"", Pod:"calico-apiserver-59f5cd6df4-k8vdw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali847218ba571", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:27.703293 env[1184]: 2025-05-10 00:45:27.587 [INFO][3554] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.54.196/32] ContainerID="01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d" Namespace="calico-apiserver" Pod="calico-apiserver-59f5cd6df4-k8vdw" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0" May 10 00:45:27.703293 env[1184]: 2025-05-10 00:45:27.587 [INFO][3554] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali847218ba571 ContainerID="01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d" Namespace="calico-apiserver" Pod="calico-apiserver-59f5cd6df4-k8vdw" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0" May 10 00:45:27.703293 env[1184]: 2025-05-10 00:45:27.621 [INFO][3554] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d" Namespace="calico-apiserver" Pod="calico-apiserver-59f5cd6df4-k8vdw" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0" May 10 00:45:27.703293 env[1184]: 2025-05-10 00:45:27.633 [INFO][3554] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d" Namespace="calico-apiserver" Pod="calico-apiserver-59f5cd6df4-k8vdw" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0", GenerateName:"calico-apiserver-59f5cd6df4-", Namespace:"calico-apiserver", SelfLink:"", UID:"131c747f-d395-4c4b-8559-06ad886de3fa", ResourceVersion:"893", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"59f5cd6df4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d", Pod:"calico-apiserver-59f5cd6df4-k8vdw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali847218ba571", MAC:"06:2a:d0:8c:4e:da", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:27.703293 env[1184]: 2025-05-10 00:45:27.683 [INFO][3554] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d" Namespace="calico-apiserver" Pod="calico-apiserver-59f5cd6df4-k8vdw" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0" May 10 00:45:27.728390 env[1184]: time="2025-05-10T00:45:27.723621787Z" level=info msg="CreateContainer within sandbox \"5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"376b93fb3b562afd5b0d7f70b20d3c270861d6d47c16d4784844c695eaffdf82\"" May 10 00:45:27.728390 env[1184]: time="2025-05-10T00:45:27.725153456Z" level=info msg="StartContainer for \"376b93fb3b562afd5b0d7f70b20d3c270861d6d47c16d4784844c695eaffdf82\"" May 10 00:45:27.728000 audit[3752]: NETFILTER_CFG table=raw:98 family=2 entries=21 op=nft_register_chain pid=3752 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:45:27.728000 audit[3752]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd4fa4b470 a2=0 a3=7ffd4fa4b45c items=0 ppid=3395 pid=3752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.728000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:45:27.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.744000 audit: BPF prog-id=163 op=LOAD May 10 00:45:27.747000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.747000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3722 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562333264643434393838326334386337626130366363323762393235 May 10 00:45:27.747000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.747000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3722 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562333264643434393838326334386337626130366363323762393235 May 10 00:45:27.748000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.748000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.748000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.748000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.748000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.748000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.748000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.748000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.748000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.748000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.748000 audit: BPF prog-id=164 op=LOAD May 10 00:45:27.748000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001fd7e0 items=0 ppid=3722 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562333264643434393838326334386337626130366363323762393235 May 10 00:45:27.749000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.749000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.749000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.749000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.749000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.749000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.749000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.749000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.749000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.749000 audit: BPF prog-id=165 op=LOAD May 10 00:45:27.749000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001fd828 items=0 ppid=3722 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562333264643434393838326334386337626130366363323762393235 May 10 00:45:27.749000 audit: BPF prog-id=165 op=UNLOAD May 10 00:45:27.749000 audit: BPF prog-id=164 op=UNLOAD May 10 00:45:27.749000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.749000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.749000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.749000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.749000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.749000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.749000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.749000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.749000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.749000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:27.749000 audit: BPF prog-id=166 op=LOAD May 10 00:45:27.749000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001fdc38 items=0 ppid=3722 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562333264643434393838326334386337626130366363323762393235 May 10 00:45:27.762000 audit[3754]: NETFILTER_CFG table=mangle:99 family=2 entries=16 op=nft_register_chain pid=3754 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:45:27.767000 audit[3755]: NETFILTER_CFG table=filter:100 family=2 entries=69 op=nft_register_chain pid=3755 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:45:27.767000 audit[3755]: SYSCALL arch=c000003e syscall=46 success=yes exit=36404 a0=3 a1=7ffc03a68bd0 a2=0 a3=7ffc03a68bbc items=0 ppid=3395 pid=3755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.767000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:45:27.784073 systemd-networkd[1002]: cali2b9bc456de6: Link UP May 10 00:45:27.787309 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:45:27.787497 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2b9bc456de6: link becomes ready May 10 00:45:27.787505 systemd-networkd[1002]: cali2b9bc456de6: Gained carrier May 10 00:45:27.795000 audit[3753]: USER_ACCT pid=3753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:27.799322 sshd[3753]: Accepted publickey for core from 139.178.68.195 port 55550 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:45:27.800000 audit[3753]: CRED_ACQ pid=3753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:27.800000 audit[3753]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3608e4e0 a2=3 a3=0 items=0 ppid=1 pid=3753 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.800000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:45:27.762000 audit[3754]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc09183140 a2=0 a3=7ffc0918312c items=0 ppid=3395 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.762000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:45:27.809579 sshd[3753]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:27.821322 systemd[1]: Started session-9.scope. May 10 00:45:27.823679 systemd-logind[1176]: New session 9 of user core. May 10 00:45:27.839000 audit[3753]: USER_START pid=3753 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:27.846000 audit[3801]: CRED_ACQ pid=3801 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:27.879761 systemd[1]: Started cri-containerd-376b93fb3b562afd5b0d7f70b20d3c270861d6d47c16d4784844c695eaffdf82.scope. May 10 00:45:27.883514 env[1184]: time="2025-05-10T00:45:27.883441726Z" level=info msg="StopPodSandbox for \"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\"" May 10 00:45:27.907829 env[1184]: 2025-05-10 00:45:27.066 [INFO][3603] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0 calico-apiserver-59f5cd6df4- calico-apiserver 92e30503-0699-4ea6-bf79-a0a97419537f 894 0 2025-05-10 00:44:58 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:59f5cd6df4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-3080830dac calico-apiserver-59f5cd6df4-9cds2 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2b9bc456de6 [] []}} ContainerID="f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5" Namespace="calico-apiserver" Pod="calico-apiserver-59f5cd6df4-9cds2" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-" May 10 00:45:27.907829 env[1184]: 2025-05-10 00:45:27.067 [INFO][3603] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5" Namespace="calico-apiserver" Pod="calico-apiserver-59f5cd6df4-9cds2" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0" May 10 00:45:27.907829 env[1184]: 2025-05-10 00:45:27.457 [INFO][3641] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5" HandleID="k8s-pod-network.f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0" May 10 00:45:27.907829 env[1184]: 2025-05-10 00:45:27.521 [INFO][3641] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5" HandleID="k8s-pod-network.f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003131b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-3080830dac", "pod":"calico-apiserver-59f5cd6df4-9cds2", "timestamp":"2025-05-10 00:45:27.456701804 +0000 UTC"}, Hostname:"ci-3510.3.7-n-3080830dac", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:45:27.907829 env[1184]: 2025-05-10 00:45:27.521 [INFO][3641] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:27.907829 env[1184]: 2025-05-10 00:45:27.566 [INFO][3641] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:27.907829 env[1184]: 2025-05-10 00:45:27.566 [INFO][3641] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-3080830dac' May 10 00:45:27.907829 env[1184]: 2025-05-10 00:45:27.610 [INFO][3641] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5" host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.907829 env[1184]: 2025-05-10 00:45:27.674 [INFO][3641] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.907829 env[1184]: 2025-05-10 00:45:27.695 [INFO][3641] ipam/ipam.go 489: Trying affinity for 192.168.54.192/26 host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.907829 env[1184]: 2025-05-10 00:45:27.705 [INFO][3641] ipam/ipam.go 155: Attempting to load block cidr=192.168.54.192/26 host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.907829 env[1184]: 2025-05-10 00:45:27.715 [INFO][3641] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.192/26 host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.907829 env[1184]: 2025-05-10 00:45:27.715 [INFO][3641] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.192/26 handle="k8s-pod-network.f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5" host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.907829 env[1184]: 2025-05-10 00:45:27.718 [INFO][3641] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5 May 10 00:45:27.907829 env[1184]: 2025-05-10 00:45:27.732 [INFO][3641] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.54.192/26 handle="k8s-pod-network.f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5" host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.907829 env[1184]: 2025-05-10 00:45:27.747 [INFO][3641] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.54.197/26] block=192.168.54.192/26 handle="k8s-pod-network.f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5" host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.907829 env[1184]: 2025-05-10 00:45:27.748 [INFO][3641] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.197/26] handle="k8s-pod-network.f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5" host="ci-3510.3.7-n-3080830dac" May 10 00:45:27.907829 env[1184]: 2025-05-10 00:45:27.748 [INFO][3641] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:27.907829 env[1184]: 2025-05-10 00:45:27.748 [INFO][3641] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.54.197/26] IPv6=[] ContainerID="f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5" HandleID="k8s-pod-network.f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0" May 10 00:45:27.913012 env[1184]: 2025-05-10 00:45:27.778 [INFO][3603] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5" Namespace="calico-apiserver" Pod="calico-apiserver-59f5cd6df4-9cds2" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0", GenerateName:"calico-apiserver-59f5cd6df4-", Namespace:"calico-apiserver", SelfLink:"", UID:"92e30503-0699-4ea6-bf79-a0a97419537f", ResourceVersion:"894", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"59f5cd6df4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"", Pod:"calico-apiserver-59f5cd6df4-9cds2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2b9bc456de6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:27.913012 env[1184]: 2025-05-10 00:45:27.778 [INFO][3603] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.54.197/32] ContainerID="f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5" Namespace="calico-apiserver" Pod="calico-apiserver-59f5cd6df4-9cds2" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0" May 10 00:45:27.913012 env[1184]: 2025-05-10 00:45:27.778 [INFO][3603] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2b9bc456de6 ContainerID="f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5" Namespace="calico-apiserver" Pod="calico-apiserver-59f5cd6df4-9cds2" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0" May 10 00:45:27.913012 env[1184]: 2025-05-10 00:45:27.789 [INFO][3603] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5" Namespace="calico-apiserver" Pod="calico-apiserver-59f5cd6df4-9cds2" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0" May 10 00:45:27.913012 env[1184]: 2025-05-10 00:45:27.789 [INFO][3603] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5" Namespace="calico-apiserver" Pod="calico-apiserver-59f5cd6df4-9cds2" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0", GenerateName:"calico-apiserver-59f5cd6df4-", Namespace:"calico-apiserver", SelfLink:"", UID:"92e30503-0699-4ea6-bf79-a0a97419537f", ResourceVersion:"894", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"59f5cd6df4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5", Pod:"calico-apiserver-59f5cd6df4-9cds2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2b9bc456de6", MAC:"9e:79:ad:e2:6e:29", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:27.913012 env[1184]: 2025-05-10 00:45:27.842 [INFO][3603] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5" Namespace="calico-apiserver" Pod="calico-apiserver-59f5cd6df4-9cds2" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0" May 10 00:45:27.937582 env[1184]: time="2025-05-10T00:45:27.904436514Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:27.937582 env[1184]: time="2025-05-10T00:45:27.904509239Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:27.937582 env[1184]: time="2025-05-10T00:45:27.904540443Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:27.937582 env[1184]: time="2025-05-10T00:45:27.905317297Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d pid=3815 runtime=io.containerd.runc.v2 May 10 00:45:27.970000 audit[3845]: NETFILTER_CFG table=filter:101 family=2 entries=128 op=nft_register_chain pid=3845 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:45:27.970000 audit[3845]: SYSCALL arch=c000003e syscall=46 success=yes exit=76528 a0=3 a1=7fff37447260 a2=0 a3=7fff3744724c items=0 ppid=3395 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.970000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:45:28.003086 env[1184]: time="2025-05-10T00:45:28.003019322Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:28.011742 env[1184]: time="2025-05-10T00:45:28.011671221Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-w2pfg,Uid:096fc47e-332e-45a4-ba28-0d240852b6c0,Namespace:kube-system,Attempt:1,} returns sandbox id \"eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3\"" May 10 00:45:28.021210 kubelet[2019]: E0510 00:45:28.021164 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:28.065133 env[1184]: time="2025-05-10T00:45:28.065054083Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:28.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.069000 audit: BPF prog-id=167 op=LOAD May 10 00:45:28.072000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3659 pid=3789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337366239336662336235363261666435623064376637306232306433 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3659 pid=3789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337366239336662336235363261666435623064376637306232306433 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit: BPF prog-id=168 op=LOAD May 10 00:45:28.072000 audit[3789]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001459d8 a2=78 a3=c0001870b0 items=0 ppid=3659 pid=3789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337366239336662336235363261666435623064376637306232306433 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit: BPF prog-id=169 op=LOAD May 10 00:45:28.072000 audit[3789]: SYSCALL arch=c000003e syscall=321 success=yes exit=19 a0=5 a1=c000145770 a2=78 a3=c0001870f8 items=0 ppid=3659 pid=3789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337366239336662336235363261666435623064376637306232306433 May 10 00:45:28.072000 audit: BPF prog-id=169 op=UNLOAD May 10 00:45:28.072000 audit: BPF prog-id=168 op=UNLOAD May 10 00:45:28.072000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.072000 audit: BPF prog-id=170 op=LOAD May 10 00:45:28.072000 audit[3789]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145c30 a2=78 a3=c000187508 items=0 ppid=3659 pid=3789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337366239336662336235363261666435623064376637306232306433 May 10 00:45:28.085146 env[1184]: time="2025-05-10T00:45:28.085086280Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:28.092774 env[1184]: time="2025-05-10T00:45:28.092088844Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:28.097260 env[1184]: time="2025-05-10T00:45:28.096961569Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 10 00:45:28.098625 env[1184]: time="2025-05-10T00:45:28.097979667Z" level=info msg="CreateContainer within sandbox \"eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:45:28.107478 env[1184]: time="2025-05-10T00:45:28.106308790Z" level=info msg="CreateContainer within sandbox \"2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 10 00:45:28.169347 env[1184]: time="2025-05-10T00:45:28.168355440Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:28.169347 env[1184]: time="2025-05-10T00:45:28.168579224Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:28.169347 env[1184]: time="2025-05-10T00:45:28.168622801Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:28.169347 env[1184]: time="2025-05-10T00:45:28.169168415Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5 pid=3899 runtime=io.containerd.runc.v2 May 10 00:45:28.176687 env[1184]: time="2025-05-10T00:45:28.170918774Z" level=info msg="CreateContainer within sandbox \"2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"3c4133dc2a2a535060717558e1d166899fbc106c3426a880808d887d24ff8061\"" May 10 00:45:28.176687 env[1184]: time="2025-05-10T00:45:28.172349932Z" level=info msg="StartContainer for \"3c4133dc2a2a535060717558e1d166899fbc106c3426a880808d887d24ff8061\"" May 10 00:45:28.231986 systemd[1]: Started cri-containerd-01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d.scope. May 10 00:45:28.251450 env[1184]: time="2025-05-10T00:45:28.251341704Z" level=info msg="CreateContainer within sandbox \"eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"67769c83700dcecac21f525a8a4f33f345f3ac73868d78ee783b395ead516334\"" May 10 00:45:28.255857 env[1184]: time="2025-05-10T00:45:28.254259247Z" level=info msg="StartContainer for \"67769c83700dcecac21f525a8a4f33f345f3ac73868d78ee783b395ead516334\"" May 10 00:45:28.293606 env[1184]: time="2025-05-10T00:45:28.293528211Z" level=info msg="StartContainer for \"376b93fb3b562afd5b0d7f70b20d3c270861d6d47c16d4784844c695eaffdf82\" returns successfully" May 10 00:45:28.441980 systemd[1]: Started cri-containerd-f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5.scope. May 10 00:45:28.483513 systemd-networkd[1002]: vxlan.calico: Gained IPv6LL May 10 00:45:28.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.509000 audit: BPF prog-id=171 op=LOAD May 10 00:45:28.512000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.512000 audit[3840]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3815 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031623932653365663030373735653439316462343938646662333037 May 10 00:45:28.518000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.518000 audit[3840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3815 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031623932653365663030373735653439316462343938646662333037 May 10 00:45:28.525000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.525000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.525000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.525000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.525000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.525000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.525000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.525000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.525000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.525000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.525000 audit: BPF prog-id=172 op=LOAD May 10 00:45:28.525000 audit[3840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000025320 items=0 ppid=3815 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031623932653365663030373735653439316462343938646662333037 May 10 00:45:28.535000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.535000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.535000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.535000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.535000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.535000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.535000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.535000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.535000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.535000 audit: BPF prog-id=173 op=LOAD May 10 00:45:28.535000 audit[3840]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000025368 items=0 ppid=3815 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031623932653365663030373735653439316462343938646662333037 May 10 00:45:28.555626 systemd[1]: Started cri-containerd-67769c83700dcecac21f525a8a4f33f345f3ac73868d78ee783b395ead516334.scope. May 10 00:45:28.554000 audit: BPF prog-id=173 op=UNLOAD May 10 00:45:28.554000 audit: BPF prog-id=172 op=UNLOAD May 10 00:45:28.554000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.554000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.554000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.554000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.554000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.554000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.554000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.554000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.554000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.554000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.554000 audit: BPF prog-id=174 op=LOAD May 10 00:45:28.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.563000 audit: BPF prog-id=175 op=LOAD May 10 00:45:28.564000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.564000 audit[3919]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3899 pid=3919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636393566376436353236306633613766613434336163343535373061 May 10 00:45:28.568000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.568000 audit[3919]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3899 pid=3919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636393566376436353236306633613766613434336163343535373061 May 10 00:45:28.570000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.570000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.570000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.570000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.570000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.570000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.570000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.570000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.570000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.570000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.570000 audit: BPF prog-id=176 op=LOAD May 10 00:45:28.570000 audit[3919]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021dac0 items=0 ppid=3899 pid=3919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636393566376436353236306633613766613434336163343535373061 May 10 00:45:28.573000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.573000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.573000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.573000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.573000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.573000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.573000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.573000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.573000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.573000 audit: BPF prog-id=177 op=LOAD May 10 00:45:28.573000 audit[3919]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021db08 items=0 ppid=3899 pid=3919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636393566376436353236306633613766613434336163343535373061 May 10 00:45:28.579000 audit: BPF prog-id=177 op=UNLOAD May 10 00:45:28.580000 audit: BPF prog-id=176 op=UNLOAD May 10 00:45:28.580000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.580000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.554000 audit[3840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000025778 items=0 ppid=3815 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.580000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.580000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.580000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.580000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.580000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.580000 audit[3919]: AVC avc: denied { perfmon } for pid=3919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.580000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031623932653365663030373735653439316462343938646662333037 May 10 00:45:28.580000 audit[3919]: AVC avc: denied { bpf } for pid=3919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.580000 audit: BPF prog-id=178 op=LOAD May 10 00:45:28.580000 audit[3919]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021df18 items=0 ppid=3899 pid=3919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636393566376436353236306633613766613434336163343535373061 May 10 00:45:28.610495 systemd[1]: Started cri-containerd-3c4133dc2a2a535060717558e1d166899fbc106c3426a880808d887d24ff8061.scope. May 10 00:45:28.636463 env[1184]: 2025-05-10 00:45:28.279 [INFO][3871] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" May 10 00:45:28.636463 env[1184]: 2025-05-10 00:45:28.279 [INFO][3871] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" iface="eth0" netns="/var/run/netns/cni-f6557851-69f6-3fa0-b458-d202e855ff40" May 10 00:45:28.636463 env[1184]: 2025-05-10 00:45:28.279 [INFO][3871] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" iface="eth0" netns="/var/run/netns/cni-f6557851-69f6-3fa0-b458-d202e855ff40" May 10 00:45:28.636463 env[1184]: 2025-05-10 00:45:28.280 [INFO][3871] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" iface="eth0" netns="/var/run/netns/cni-f6557851-69f6-3fa0-b458-d202e855ff40" May 10 00:45:28.636463 env[1184]: 2025-05-10 00:45:28.280 [INFO][3871] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" May 10 00:45:28.636463 env[1184]: 2025-05-10 00:45:28.280 [INFO][3871] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" May 10 00:45:28.636463 env[1184]: 2025-05-10 00:45:28.538 [INFO][3944] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" HandleID="k8s-pod-network.dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0" May 10 00:45:28.636463 env[1184]: 2025-05-10 00:45:28.538 [INFO][3944] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:28.636463 env[1184]: 2025-05-10 00:45:28.539 [INFO][3944] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:28.636463 env[1184]: 2025-05-10 00:45:28.622 [WARNING][3944] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" HandleID="k8s-pod-network.dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0" May 10 00:45:28.636463 env[1184]: 2025-05-10 00:45:28.622 [INFO][3944] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" HandleID="k8s-pod-network.dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0" May 10 00:45:28.636463 env[1184]: 2025-05-10 00:45:28.625 [INFO][3944] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:28.636463 env[1184]: 2025-05-10 00:45:28.632 [INFO][3871] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" May 10 00:45:28.638265 env[1184]: time="2025-05-10T00:45:28.638188066Z" level=info msg="TearDown network for sandbox \"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\" successfully" May 10 00:45:28.638464 env[1184]: time="2025-05-10T00:45:28.638432750Z" level=info msg="StopPodSandbox for \"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\" returns successfully" May 10 00:45:28.639654 env[1184]: time="2025-05-10T00:45:28.639610130Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5fb854744b-zgtlb,Uid:bbc2d3bc-030b-407e-bd10-438dc51276da,Namespace:calico-system,Attempt:1,}" May 10 00:45:28.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.725000 audit: BPF prog-id=179 op=LOAD May 10 00:45:28.734066 systemd-networkd[1002]: calia522b3b8512: Gained IPv6LL May 10 00:45:28.738000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.738000 audit[3945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3722 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373639633833373030646365636163323166353235613861346633 May 10 00:45:28.738000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.738000 audit[3945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3722 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373639633833373030646365636163323166353235613861346633 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit: BPF prog-id=180 op=LOAD May 10 00:45:28.743000 audit[3945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001df380 items=0 ppid=3722 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373639633833373030646365636163323166353235613861346633 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit: BPF prog-id=181 op=LOAD May 10 00:45:28.743000 audit[3945]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001df3c8 items=0 ppid=3722 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373639633833373030646365636163323166353235613861346633 May 10 00:45:28.743000 audit: BPF prog-id=181 op=UNLOAD May 10 00:45:28.743000 audit: BPF prog-id=180 op=UNLOAD May 10 00:45:28.743000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.743000 audit: BPF prog-id=182 op=LOAD May 10 00:45:28.743000 audit[3945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001df7d8 items=0 ppid=3722 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373639633833373030646365636163323166353235613861346633 May 10 00:45:28.785179 sshd[3753]: pam_unix(sshd:session): session closed for user core May 10 00:45:28.785000 audit[3753]: USER_END pid=3753 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:28.785000 audit[3753]: CRED_DISP pid=3753 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:28.790397 systemd[1]: sshd@8-143.198.48.176:22-139.178.68.195:55550.service: Deactivated successfully. May 10 00:45:28.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-143.198.48.176:22-139.178.68.195:55550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:28.791655 systemd[1]: session-9.scope: Deactivated successfully. May 10 00:45:28.793128 systemd-logind[1176]: Session 9 logged out. Waiting for processes to exit. May 10 00:45:28.796050 systemd-logind[1176]: Removed session 9. May 10 00:45:28.833312 env[1184]: time="2025-05-10T00:45:28.833245514Z" level=info msg="StartContainer for \"67769c83700dcecac21f525a8a4f33f345f3ac73868d78ee783b395ead516334\" returns successfully" May 10 00:45:28.858071 systemd-networkd[1002]: cali2b9bc456de6: Gained IPv6LL May 10 00:45:28.916836 env[1184]: time="2025-05-10T00:45:28.916786554Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59f5cd6df4-k8vdw,Uid:131c747f-d395-4c4b-8559-06ad886de3fa,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d\"" May 10 00:45:28.922493 env[1184]: time="2025-05-10T00:45:28.922429159Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:45:28.942000 audit[3953]: AVC avc: denied { perfmon } for pid=3953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.942000 audit[3953]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f4aa9800be8 items=0 ppid=3329 pid=3953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363343133336463326132613533353036303731373535386531643136 May 10 00:45:28.943000 audit[3953]: AVC avc: denied { bpf } for pid=3953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.943000 audit[3953]: AVC avc: denied { bpf } for pid=3953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.943000 audit[3953]: AVC avc: denied { bpf } for pid=3953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.943000 audit[3953]: AVC avc: denied { perfmon } for pid=3953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.943000 audit[3953]: AVC avc: denied { perfmon } for pid=3953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.943000 audit[3953]: AVC avc: denied { perfmon } for pid=3953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.943000 audit[3953]: AVC avc: denied { perfmon } for pid=3953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.943000 audit[3953]: AVC avc: denied { perfmon } for pid=3953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.943000 audit[3953]: AVC avc: denied { bpf } for pid=3953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.943000 audit[3953]: AVC avc: denied { bpf } for pid=3953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.943000 audit: BPF prog-id=183 op=LOAD May 10 00:45:28.943000 audit[3953]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00033e588 items=0 ppid=3329 pid=3953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363343133336463326132613533353036303731373535386531643136 May 10 00:45:28.945000 audit[3953]: AVC avc: denied { bpf } for pid=3953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.945000 audit[3953]: AVC avc: denied { bpf } for pid=3953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.945000 audit[3953]: AVC avc: denied { perfmon } for pid=3953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.945000 audit[3953]: AVC avc: denied { perfmon } for pid=3953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.945000 audit[3953]: AVC avc: denied { perfmon } for pid=3953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.945000 audit[3953]: AVC avc: denied { perfmon } for pid=3953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.945000 audit[3953]: AVC avc: denied { perfmon } for pid=3953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.945000 audit[3953]: AVC avc: denied { bpf } for pid=3953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.945000 audit[3953]: AVC avc: denied { bpf } for pid=3953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.945000 audit: BPF prog-id=184 op=LOAD May 10 00:45:28.945000 audit[3953]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00033e5d8 items=0 ppid=3329 pid=3953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363343133336463326132613533353036303731373535386531643136 May 10 00:45:28.946000 audit: BPF prog-id=184 op=UNLOAD May 10 00:45:28.946000 audit: BPF prog-id=183 op=UNLOAD May 10 00:45:28.946000 audit[3953]: AVC avc: denied { bpf } for pid=3953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.946000 audit[3953]: AVC avc: denied { bpf } for pid=3953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.946000 audit[3953]: AVC avc: denied { bpf } for pid=3953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.946000 audit[3953]: AVC avc: denied { perfmon } for pid=3953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.946000 audit[3953]: AVC avc: denied { perfmon } for pid=3953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.946000 audit[3953]: AVC avc: denied { perfmon } for pid=3953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.946000 audit[3953]: AVC avc: denied { perfmon } for pid=3953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.946000 audit[3953]: AVC avc: denied { perfmon } for pid=3953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.946000 audit[3953]: AVC avc: denied { bpf } for pid=3953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.946000 audit[3953]: AVC avc: denied { bpf } for pid=3953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:28.946000 audit: BPF prog-id=185 op=LOAD May 10 00:45:28.946000 audit[3953]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00033e668 items=0 ppid=3329 pid=3953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:28.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363343133336463326132613533353036303731373535386531643136 May 10 00:45:29.012511 env[1184]: time="2025-05-10T00:45:29.012348610Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59f5cd6df4-9cds2,Uid:92e30503-0699-4ea6-bf79-a0a97419537f,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5\"" May 10 00:45:29.032170 env[1184]: time="2025-05-10T00:45:29.032104633Z" level=info msg="StartContainer for \"3c4133dc2a2a535060717558e1d166899fbc106c3426a880808d887d24ff8061\" returns successfully" May 10 00:45:29.173564 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:45:29.173781 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali827dddf4beb: link becomes ready May 10 00:45:29.175663 systemd-networkd[1002]: cali827dddf4beb: Link UP May 10 00:45:29.176707 systemd-networkd[1002]: cali827dddf4beb: Gained carrier May 10 00:45:29.177953 systemd-networkd[1002]: cali18c983a7d40: Gained IPv6LL May 10 00:45:29.223462 env[1184]: 2025-05-10 00:45:28.815 [INFO][3997] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0 calico-kube-controllers-5fb854744b- calico-system bbc2d3bc-030b-407e-bd10-438dc51276da 934 0 2025-05-10 00:44:59 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5fb854744b projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.7-n-3080830dac calico-kube-controllers-5fb854744b-zgtlb eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali827dddf4beb [] []}} ContainerID="34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c" Namespace="calico-system" Pod="calico-kube-controllers-5fb854744b-zgtlb" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-" May 10 00:45:29.223462 env[1184]: 2025-05-10 00:45:28.816 [INFO][3997] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c" Namespace="calico-system" Pod="calico-kube-controllers-5fb854744b-zgtlb" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0" May 10 00:45:29.223462 env[1184]: 2025-05-10 00:45:29.076 [INFO][4028] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c" HandleID="k8s-pod-network.34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0" May 10 00:45:29.223462 env[1184]: 2025-05-10 00:45:29.101 [INFO][4028] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c" HandleID="k8s-pod-network.34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000284da0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-3080830dac", "pod":"calico-kube-controllers-5fb854744b-zgtlb", "timestamp":"2025-05-10 00:45:29.076085681 +0000 UTC"}, Hostname:"ci-3510.3.7-n-3080830dac", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:45:29.223462 env[1184]: 2025-05-10 00:45:29.101 [INFO][4028] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:29.223462 env[1184]: 2025-05-10 00:45:29.102 [INFO][4028] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:29.223462 env[1184]: 2025-05-10 00:45:29.102 [INFO][4028] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-3080830dac' May 10 00:45:29.223462 env[1184]: 2025-05-10 00:45:29.104 [INFO][4028] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c" host="ci-3510.3.7-n-3080830dac" May 10 00:45:29.223462 env[1184]: 2025-05-10 00:45:29.112 [INFO][4028] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-3080830dac" May 10 00:45:29.223462 env[1184]: 2025-05-10 00:45:29.120 [INFO][4028] ipam/ipam.go 489: Trying affinity for 192.168.54.192/26 host="ci-3510.3.7-n-3080830dac" May 10 00:45:29.223462 env[1184]: 2025-05-10 00:45:29.124 [INFO][4028] ipam/ipam.go 155: Attempting to load block cidr=192.168.54.192/26 host="ci-3510.3.7-n-3080830dac" May 10 00:45:29.223462 env[1184]: 2025-05-10 00:45:29.129 [INFO][4028] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.192/26 host="ci-3510.3.7-n-3080830dac" May 10 00:45:29.223462 env[1184]: 2025-05-10 00:45:29.129 [INFO][4028] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.192/26 handle="k8s-pod-network.34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c" host="ci-3510.3.7-n-3080830dac" May 10 00:45:29.223462 env[1184]: 2025-05-10 00:45:29.132 [INFO][4028] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c May 10 00:45:29.223462 env[1184]: 2025-05-10 00:45:29.139 [INFO][4028] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.54.192/26 handle="k8s-pod-network.34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c" host="ci-3510.3.7-n-3080830dac" May 10 00:45:29.223462 env[1184]: 2025-05-10 00:45:29.164 [INFO][4028] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.54.198/26] block=192.168.54.192/26 handle="k8s-pod-network.34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c" host="ci-3510.3.7-n-3080830dac" May 10 00:45:29.223462 env[1184]: 2025-05-10 00:45:29.164 [INFO][4028] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.198/26] handle="k8s-pod-network.34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c" host="ci-3510.3.7-n-3080830dac" May 10 00:45:29.223462 env[1184]: 2025-05-10 00:45:29.164 [INFO][4028] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:29.223462 env[1184]: 2025-05-10 00:45:29.164 [INFO][4028] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.54.198/26] IPv6=[] ContainerID="34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c" HandleID="k8s-pod-network.34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0" May 10 00:45:29.225058 env[1184]: 2025-05-10 00:45:29.168 [INFO][3997] cni-plugin/k8s.go 386: Populated endpoint ContainerID="34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c" Namespace="calico-system" Pod="calico-kube-controllers-5fb854744b-zgtlb" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0", GenerateName:"calico-kube-controllers-5fb854744b-", Namespace:"calico-system", SelfLink:"", UID:"bbc2d3bc-030b-407e-bd10-438dc51276da", ResourceVersion:"934", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5fb854744b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"", Pod:"calico-kube-controllers-5fb854744b-zgtlb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.54.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali827dddf4beb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:29.225058 env[1184]: 2025-05-10 00:45:29.169 [INFO][3997] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.54.198/32] ContainerID="34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c" Namespace="calico-system" Pod="calico-kube-controllers-5fb854744b-zgtlb" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0" May 10 00:45:29.225058 env[1184]: 2025-05-10 00:45:29.169 [INFO][3997] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali827dddf4beb ContainerID="34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c" Namespace="calico-system" Pod="calico-kube-controllers-5fb854744b-zgtlb" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0" May 10 00:45:29.225058 env[1184]: 2025-05-10 00:45:29.176 [INFO][3997] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c" Namespace="calico-system" Pod="calico-kube-controllers-5fb854744b-zgtlb" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0" May 10 00:45:29.225058 env[1184]: 2025-05-10 00:45:29.177 [INFO][3997] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c" Namespace="calico-system" Pod="calico-kube-controllers-5fb854744b-zgtlb" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0", GenerateName:"calico-kube-controllers-5fb854744b-", Namespace:"calico-system", SelfLink:"", UID:"bbc2d3bc-030b-407e-bd10-438dc51276da", ResourceVersion:"934", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5fb854744b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c", Pod:"calico-kube-controllers-5fb854744b-zgtlb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.54.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali827dddf4beb", MAC:"b6:5e:25:34:bb:e8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:29.225058 env[1184]: 2025-05-10 00:45:29.213 [INFO][3997] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c" Namespace="calico-system" Pod="calico-kube-controllers-5fb854744b-zgtlb" WorkloadEndpoint="ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0" May 10 00:45:29.249000 audit[4065]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=4065 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:45:29.249000 audit[4065]: SYSCALL arch=c000003e syscall=46 success=yes exit=19848 a0=3 a1=7ffd65027060 a2=0 a3=7ffd6502704c items=0 ppid=3395 pid=4065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:29.249000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:45:29.263946 env[1184]: time="2025-05-10T00:45:29.263669043Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:29.266268 env[1184]: time="2025-05-10T00:45:29.263897220Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:29.266756 env[1184]: time="2025-05-10T00:45:29.266427723Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:29.267093 env[1184]: time="2025-05-10T00:45:29.267002433Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c pid=4073 runtime=io.containerd.runc.v2 May 10 00:45:29.294135 systemd[1]: Started cri-containerd-34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c.scope. May 10 00:45:29.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.322000 audit: BPF prog-id=186 op=LOAD May 10 00:45:29.323000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4073 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:29.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334373436666339356562366339343432653836333733623333643638 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4073 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:29.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334373436666339356562366339343432653836333733623333643638 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit: BPF prog-id=187 op=LOAD May 10 00:45:29.323000 audit[4085]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c4f60 items=0 ppid=4073 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:29.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334373436666339356562366339343432653836333733623333643638 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit: BPF prog-id=188 op=LOAD May 10 00:45:29.323000 audit[4085]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003c4fa8 items=0 ppid=4073 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:29.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334373436666339356562366339343432653836333733623333643638 May 10 00:45:29.323000 audit: BPF prog-id=188 op=UNLOAD May 10 00:45:29.323000 audit: BPF prog-id=187 op=UNLOAD May 10 00:45:29.323000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.323000 audit: BPF prog-id=189 op=LOAD May 10 00:45:29.323000 audit[4085]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c53b8 items=0 ppid=4073 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:29.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334373436666339356562366339343432653836333733623333643638 May 10 00:45:29.365232 systemd[1]: run-containerd-runc-k8s.io-67769c83700dcecac21f525a8a4f33f345f3ac73868d78ee783b395ead516334-runc.swxCfj.mount: Deactivated successfully. May 10 00:45:29.365363 systemd[1]: run-netns-cni\x2df6557851\x2d69f6\x2d3fa0\x2db458\x2dd202e855ff40.mount: Deactivated successfully. May 10 00:45:29.389376 env[1184]: time="2025-05-10T00:45:29.388964714Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5fb854744b-zgtlb,Uid:bbc2d3bc-030b-407e-bd10-438dc51276da,Namespace:calico-system,Attempt:1,} returns sandbox id \"34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c\"" May 10 00:45:29.425862 kubelet[2019]: E0510 00:45:29.425812 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:29.465935 kubelet[2019]: E0510 00:45:29.465889 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:29.511000 audit[4109]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=4109 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:29.511000 audit[4109]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe2fd27600 a2=0 a3=7ffe2fd275ec items=0 ppid=2170 pid=4109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:29.511000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:29.518000 audit[4109]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=4109 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:29.518000 audit[4109]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe2fd27600 a2=0 a3=0 items=0 ppid=2170 pid=4109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:29.518000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:29.538076 kubelet[2019]: I0510 00:45:29.534241 2019 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-w2pfg" podStartSLOduration=37.534208763 podStartE2EDuration="37.534208763s" podCreationTimestamp="2025-05-10 00:44:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:45:29.455333535 +0000 UTC m=+50.947485808" watchObservedRunningTime="2025-05-10 00:45:29.534208763 +0000 UTC m=+51.026361037" May 10 00:45:29.575315 kubelet[2019]: I0510 00:45:29.575211 2019 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-g6mxn" podStartSLOduration=37.575183303 podStartE2EDuration="37.575183303s" podCreationTimestamp="2025-05-10 00:44:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:45:29.572524186 +0000 UTC m=+51.064676452" watchObservedRunningTime="2025-05-10 00:45:29.575183303 +0000 UTC m=+51.067335574" May 10 00:45:29.594000 audit[4111]: NETFILTER_CFG table=filter:105 family=2 entries=13 op=nft_register_rule pid=4111 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:29.594000 audit[4111]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc20d94720 a2=0 a3=7ffc20d9470c items=0 ppid=2170 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:29.594000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:29.598000 audit[4111]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=4111 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:29.598000 audit[4111]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc20d94720 a2=0 a3=7ffc20d9470c items=0 ppid=2170 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:29.598000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:29.626500 systemd-networkd[1002]: cali847218ba571: Gained IPv6LL May 10 00:45:30.474040 systemd[1]: run-containerd-runc-k8s.io-e9d9994f15584b0a9a6f75a4929296fce69c2fd4c0f3ba844087eb24b1a74e0e-runc.3HXxte.mount: Deactivated successfully. May 10 00:45:30.521774 kubelet[2019]: E0510 00:45:30.521586 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:30.539382 kubelet[2019]: E0510 00:45:30.527162 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:30.538485 systemd-networkd[1002]: cali827dddf4beb: Gained IPv6LL May 10 00:45:30.651000 audit[4134]: NETFILTER_CFG table=filter:107 family=2 entries=10 op=nft_register_rule pid=4134 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:30.651000 audit[4134]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff5126f6d0 a2=0 a3=7fff5126f6bc items=0 ppid=2170 pid=4134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:30.651000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:30.669480 kubelet[2019]: E0510 00:45:30.669441 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:30.685000 audit[4134]: NETFILTER_CFG table=nat:108 family=2 entries=56 op=nft_register_chain pid=4134 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:30.685000 audit[4134]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff5126f6d0 a2=0 a3=7fff5126f6bc items=0 ppid=2170 pid=4134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:30.685000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:31.521848 kubelet[2019]: E0510 00:45:31.521797 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:32.027163 env[1184]: time="2025-05-10T00:45:32.027055031Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:32.031437 env[1184]: time="2025-05-10T00:45:32.031367080Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:32.035499 env[1184]: time="2025-05-10T00:45:32.035435570Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:32.038853 env[1184]: time="2025-05-10T00:45:32.038789662Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:32.041394 env[1184]: time="2025-05-10T00:45:32.040436016Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:45:32.046485 env[1184]: time="2025-05-10T00:45:32.046401937Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:45:32.052549 env[1184]: time="2025-05-10T00:45:32.052490910Z" level=info msg="CreateContainer within sandbox \"01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:45:32.074623 env[1184]: time="2025-05-10T00:45:32.074465273Z" level=info msg="CreateContainer within sandbox \"01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"765828155bb1da3522ecbcaa9b8e524604a72c1586c46fa91664cbf63886c331\"" May 10 00:45:32.077159 env[1184]: time="2025-05-10T00:45:32.077105423Z" level=info msg="StartContainer for \"765828155bb1da3522ecbcaa9b8e524604a72c1586c46fa91664cbf63886c331\"" May 10 00:45:32.130023 systemd[1]: run-containerd-runc-k8s.io-765828155bb1da3522ecbcaa9b8e524604a72c1586c46fa91664cbf63886c331-runc.oxxmqY.mount: Deactivated successfully. May 10 00:45:32.135042 systemd[1]: Started cri-containerd-765828155bb1da3522ecbcaa9b8e524604a72c1586c46fa91664cbf63886c331.scope. May 10 00:45:32.157412 kernel: kauditd_printk_skb: 908 callbacks suppressed May 10 00:45:32.157634 kernel: audit: type=1400 audit(1746837932.154:1230): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.162245 kernel: audit: type=1400 audit(1746837932.154:1231): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.162444 kernel: audit: type=1400 audit(1746837932.154:1232): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.173405 kernel: audit: type=1400 audit(1746837932.154:1233): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.173602 kernel: audit: type=1400 audit(1746837932.154:1234): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.173644 kernel: audit: type=1400 audit(1746837932.154:1235): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.181785 kernel: audit: type=1400 audit(1746837932.154:1236): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.181934 kernel: audit: type=1400 audit(1746837932.154:1237): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.181963 kernel: audit: type=1400 audit(1746837932.154:1238): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.187192 kernel: audit: type=1400 audit(1746837932.156:1239): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.156000 audit: BPF prog-id=190 op=LOAD May 10 00:45:32.164000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3815 pid=4145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:32.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736353832383135356262316461333532326563626361613962386535 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3815 pid=4145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:32.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736353832383135356262316461333532326563626361613962386535 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit: BPF prog-id=191 op=LOAD May 10 00:45:32.164000 audit[4145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000099420 items=0 ppid=3815 pid=4145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:32.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736353832383135356262316461333532326563626361613962386535 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit: BPF prog-id=192 op=LOAD May 10 00:45:32.164000 audit[4145]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000099468 items=0 ppid=3815 pid=4145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:32.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736353832383135356262316461333532326563626361613962386535 May 10 00:45:32.164000 audit: BPF prog-id=192 op=UNLOAD May 10 00:45:32.164000 audit: BPF prog-id=191 op=UNLOAD May 10 00:45:32.164000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { perfmon } for pid=4145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit[4145]: AVC avc: denied { bpf } for pid=4145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.164000 audit: BPF prog-id=193 op=LOAD May 10 00:45:32.164000 audit[4145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000099878 items=0 ppid=3815 pid=4145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:32.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736353832383135356262316461333532326563626361613962386535 May 10 00:45:32.226705 env[1184]: time="2025-05-10T00:45:32.226625048Z" level=info msg="StartContainer for \"765828155bb1da3522ecbcaa9b8e524604a72c1586c46fa91664cbf63886c331\" returns successfully" May 10 00:45:32.299000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:32.299000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002de2000 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:45:32.299000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:32.306000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:32.306000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00216c030 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:45:32.306000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:32.419681 env[1184]: time="2025-05-10T00:45:32.419617912Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:32.420842 env[1184]: time="2025-05-10T00:45:32.420801952Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:32.422438 env[1184]: time="2025-05-10T00:45:32.422399002Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:32.424051 env[1184]: time="2025-05-10T00:45:32.424005662Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:32.425028 env[1184]: time="2025-05-10T00:45:32.424988085Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:45:32.429945 env[1184]: time="2025-05-10T00:45:32.428197120Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 10 00:45:32.432922 env[1184]: time="2025-05-10T00:45:32.432865203Z" level=info msg="CreateContainer within sandbox \"f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:45:32.457325 env[1184]: time="2025-05-10T00:45:32.453928935Z" level=info msg="CreateContainer within sandbox \"f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"104184bf65e068d13fecebd47d0c0d7ea58832ecf6491a08ca669409aee7b219\"" May 10 00:45:32.457577 env[1184]: time="2025-05-10T00:45:32.457534115Z" level=info msg="StartContainer for \"104184bf65e068d13fecebd47d0c0d7ea58832ecf6491a08ca669409aee7b219\"" May 10 00:45:32.499980 systemd[1]: Started cri-containerd-104184bf65e068d13fecebd47d0c0d7ea58832ecf6491a08ca669409aee7b219.scope. May 10 00:45:32.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.564000 audit: BPF prog-id=194 op=LOAD May 10 00:45:32.566000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.566000 audit[4186]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3899 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:32.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130343138346266363565303638643133666563656264343764306330 May 10 00:45:32.566000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.566000 audit[4186]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3899 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:32.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130343138346266363565303638643133666563656264343764306330 May 10 00:45:32.566000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.566000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.566000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.566000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.566000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.566000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.566000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.566000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.566000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.566000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.566000 audit: BPF prog-id=195 op=LOAD May 10 00:45:32.566000 audit[4186]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002eddb0 items=0 ppid=3899 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:32.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130343138346266363565303638643133666563656264343764306330 May 10 00:45:32.566000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.566000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.566000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.566000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.566000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.566000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.566000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.566000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.566000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.566000 audit: BPF prog-id=196 op=LOAD May 10 00:45:32.566000 audit[4186]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002eddf8 items=0 ppid=3899 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:32.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130343138346266363565303638643133666563656264343764306330 May 10 00:45:32.569000 audit: BPF prog-id=196 op=UNLOAD May 10 00:45:32.569000 audit: BPF prog-id=195 op=UNLOAD May 10 00:45:32.569000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.569000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.569000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.569000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.569000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.569000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.569000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.569000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.569000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.569000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.569000 audit: BPF prog-id=197 op=LOAD May 10 00:45:32.569000 audit[4186]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003cc208 items=0 ppid=3899 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:32.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130343138346266363565303638643133666563656264343764306330 May 10 00:45:32.582000 audit[4204]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=4204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:32.582000 audit[4204]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff327cfbd0 a2=0 a3=7fff327cfbbc items=0 ppid=2170 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:32.582000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:32.593000 audit[4204]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=4204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:32.593000 audit[4204]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff327cfbd0 a2=0 a3=7fff327cfbbc items=0 ppid=2170 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:32.593000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:32.634854 env[1184]: time="2025-05-10T00:45:32.634773484Z" level=info msg="StartContainer for \"104184bf65e068d13fecebd47d0c0d7ea58832ecf6491a08ca669409aee7b219\" returns successfully" May 10 00:45:33.068704 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2261904043.mount: Deactivated successfully. May 10 00:45:33.582030 kubelet[2019]: I0510 00:45:33.581928 2019 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-59f5cd6df4-k8vdw" podStartSLOduration=32.455080439 podStartE2EDuration="35.581900079s" podCreationTimestamp="2025-05-10 00:44:58 +0000 UTC" firstStartedPulling="2025-05-10 00:45:28.919204743 +0000 UTC m=+50.411356996" lastFinishedPulling="2025-05-10 00:45:32.046024386 +0000 UTC m=+53.538176636" observedRunningTime="2025-05-10 00:45:32.554489079 +0000 UTC m=+54.046641352" watchObservedRunningTime="2025-05-10 00:45:33.581900079 +0000 UTC m=+55.074052354" May 10 00:45:33.610000 audit[1870]: AVC avc: denied { watch } for pid=1870 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:33.610000 audit[1870]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c005e6bdd0 a2=fc6 a3=0 items=0 ppid=1752 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 key=(null) May 10 00:45:33.610000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134332E3139382E34382E313736002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 00:45:33.619000 audit[4225]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4225 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:33.619000 audit[4225]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc6ea1d860 a2=0 a3=7ffc6ea1d84c items=0 ppid=2170 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.619000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:33.624000 audit[4225]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4225 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:33.624000 audit[4225]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc6ea1d860 a2=0 a3=7ffc6ea1d84c items=0 ppid=2170 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.624000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:33.625000 audit[1870]: AVC avc: denied { watch } for pid=1870 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:33.625000 audit[1870]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c006a7ad60 a2=fc6 a3=0 items=0 ppid=1752 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 key=(null) May 10 00:45:33.625000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134332E3139382E34382E313736002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 00:45:33.626000 audit[1870]: AVC avc: denied { watch } for pid=1870 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:33.626000 audit[1870]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c003583170 a2=fc6 a3=0 items=0 ppid=1752 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 key=(null) May 10 00:45:33.626000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134332E3139382E34382E313736002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 00:45:33.628000 audit[1870]: AVC avc: denied { watch } for pid=1870 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:33.628000 audit[1870]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00a180b10 a2=fc6 a3=0 items=0 ppid=1752 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 key=(null) May 10 00:45:33.628000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134332E3139382E34382E313736002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 00:45:33.673000 audit[1870]: AVC avc: denied { watch } for pid=1870 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:33.673000 audit[1870]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c005750e60 a2=fc6 a3=0 items=0 ppid=1752 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 key=(null) May 10 00:45:33.673000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134332E3139382E34382E313736002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 00:45:33.673000 audit[1870]: AVC avc: denied { watch } for pid=1870 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:33.673000 audit[1870]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c0040de3c0 a2=fc6 a3=0 items=0 ppid=1752 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 key=(null) May 10 00:45:33.673000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134332E3139382E34382E313736002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 00:45:33.801375 systemd[1]: Started sshd@9-143.198.48.176:22-139.178.68.195:55562.service. May 10 00:45:33.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-143.198.48.176:22-139.178.68.195:55562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:33.872000 audit[4227]: USER_ACCT pid=4227 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:33.873678 sshd[4227]: Accepted publickey for core from 139.178.68.195 port 55562 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:45:33.875000 audit[4227]: CRED_ACQ pid=4227 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:33.875000 audit[4227]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd90cb8ea0 a2=3 a3=0 items=0 ppid=1 pid=4227 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.875000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:45:33.878003 sshd[4227]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:33.887799 systemd[1]: Started session-10.scope. May 10 00:45:33.889977 systemd-logind[1176]: New session 10 of user core. May 10 00:45:33.901000 audit[4227]: USER_START pid=4227 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:33.904000 audit[4229]: CRED_ACQ pid=4229 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:34.128000 audit[4156]: AVC avc: denied { watch } for pid=4156 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_45_11.2099697569/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c823 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c186,c823 tclass=file permissive=0 May 10 00:45:34.128000 audit[4156]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e81e20 a2=fc6 a3=0 items=0 ppid=3815 pid=4156 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c823 key=(null) May 10 00:45:34.128000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:45:34.193275 kubelet[2019]: I0510 00:45:34.192480 2019 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-59f5cd6df4-9cds2" podStartSLOduration=32.787680193 podStartE2EDuration="36.192451539s" podCreationTimestamp="2025-05-10 00:44:58 +0000 UTC" firstStartedPulling="2025-05-10 00:45:29.021436289 +0000 UTC m=+50.513588541" lastFinishedPulling="2025-05-10 00:45:32.426207624 +0000 UTC m=+53.918359887" observedRunningTime="2025-05-10 00:45:33.583810507 +0000 UTC m=+55.075962776" watchObservedRunningTime="2025-05-10 00:45:34.192451539 +0000 UTC m=+55.684603808" May 10 00:45:34.300000 audit[4239]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=4239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:34.300000 audit[4239]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd53c2dee0 a2=0 a3=7ffd53c2decc items=0 ppid=2170 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:34.309000 audit[4239]: NETFILTER_CFG table=nat:114 family=2 entries=27 op=nft_register_chain pid=4239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:34.309000 audit[4239]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd53c2dee0 a2=0 a3=7ffd53c2decc items=0 ppid=2170 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.309000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:34.449122 sshd[4227]: pam_unix(sshd:session): session closed for user core May 10 00:45:34.452000 audit[4227]: USER_END pid=4227 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:34.452000 audit[4227]: CRED_DISP pid=4227 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:34.459813 systemd[1]: sshd@9-143.198.48.176:22-139.178.68.195:55562.service: Deactivated successfully. May 10 00:45:34.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-143.198.48.176:22-139.178.68.195:55562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:34.465702 systemd[1]: session-10.scope: Deactivated successfully. May 10 00:45:34.468039 systemd-logind[1176]: Session 10 logged out. Waiting for processes to exit. May 10 00:45:34.472483 systemd[1]: Started sshd@10-143.198.48.176:22-139.178.68.195:55574.service. May 10 00:45:34.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-143.198.48.176:22-139.178.68.195:55574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:34.477059 systemd-logind[1176]: Removed session 10. May 10 00:45:34.551632 kubelet[2019]: I0510 00:45:34.551557 2019 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:45:34.555264 sshd[4244]: Accepted publickey for core from 139.178.68.195 port 55574 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:45:34.554000 audit[4244]: USER_ACCT pid=4244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:34.556000 audit[4244]: CRED_ACQ pid=4244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:34.556000 audit[4244]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5e1faa20 a2=3 a3=0 items=0 ppid=1 pid=4244 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.556000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:45:34.558314 sshd[4244]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:34.568308 systemd[1]: Started session-11.scope. May 10 00:45:34.577329 systemd-logind[1176]: New session 11 of user core. May 10 00:45:34.584000 audit[4244]: USER_START pid=4244 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:34.587000 audit[4246]: CRED_ACQ pid=4246 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:34.768000 audit[4197]: AVC avc: denied { watch } for pid=4197 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_45_11.1879250218/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c833 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c391,c833 tclass=file permissive=0 May 10 00:45:34.768000 audit[4197]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c486a0 a2=fc6 a3=0 items=0 ppid=3899 pid=4197 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c833 key=(null) May 10 00:45:34.768000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:45:34.933283 sshd[4244]: pam_unix(sshd:session): session closed for user core May 10 00:45:34.938000 audit[4244]: USER_END pid=4244 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:34.938000 audit[4244]: CRED_DISP pid=4244 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:34.943596 systemd[1]: Started sshd@11-143.198.48.176:22-139.178.68.195:55584.service. May 10 00:45:34.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-143.198.48.176:22-139.178.68.195:55584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:34.957544 systemd[1]: sshd@10-143.198.48.176:22-139.178.68.195:55574.service: Deactivated successfully. May 10 00:45:34.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-143.198.48.176:22-139.178.68.195:55574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:34.959289 systemd[1]: session-11.scope: Deactivated successfully. May 10 00:45:34.965074 systemd-logind[1176]: Session 11 logged out. Waiting for processes to exit. May 10 00:45:34.969164 systemd-logind[1176]: Removed session 11. May 10 00:45:35.030000 audit[4253]: USER_ACCT pid=4253 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:35.032575 sshd[4253]: Accepted publickey for core from 139.178.68.195 port 55584 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:45:35.032000 audit[4253]: CRED_ACQ pid=4253 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:35.032000 audit[4253]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1d001ec0 a2=3 a3=0 items=0 ppid=1 pid=4253 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:35.032000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:45:35.034103 sshd[4253]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:35.042350 systemd-logind[1176]: New session 12 of user core. May 10 00:45:35.043658 systemd[1]: Started session-12.scope. May 10 00:45:35.056000 audit[4253]: USER_START pid=4253 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:35.059000 audit[4256]: CRED_ACQ pid=4256 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:35.238055 sshd[4253]: pam_unix(sshd:session): session closed for user core May 10 00:45:35.239000 audit[4253]: USER_END pid=4253 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:35.239000 audit[4253]: CRED_DISP pid=4253 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:35.243868 systemd[1]: sshd@11-143.198.48.176:22-139.178.68.195:55584.service: Deactivated successfully. May 10 00:45:35.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-143.198.48.176:22-139.178.68.195:55584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:35.245224 systemd[1]: session-12.scope: Deactivated successfully. May 10 00:45:35.246924 systemd-logind[1176]: Session 12 logged out. Waiting for processes to exit. May 10 00:45:35.249650 systemd-logind[1176]: Removed session 12. May 10 00:45:38.235592 env[1184]: time="2025-05-10T00:45:38.235523483Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:38.239222 env[1184]: time="2025-05-10T00:45:38.239165130Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:38.241867 env[1184]: time="2025-05-10T00:45:38.241805351Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:38.244618 env[1184]: time="2025-05-10T00:45:38.244557131Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:38.246876 env[1184]: time="2025-05-10T00:45:38.246805446Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 10 00:45:38.253277 env[1184]: time="2025-05-10T00:45:38.253200911Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 10 00:45:38.254463 env[1184]: time="2025-05-10T00:45:38.254388924Z" level=info msg="CreateContainer within sandbox \"2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 10 00:45:38.287371 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1022564316.mount: Deactivated successfully. May 10 00:45:38.293507 env[1184]: time="2025-05-10T00:45:38.293445297Z" level=info msg="CreateContainer within sandbox \"2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"298ba15ed05d14ed8a29da2362f858601a71bc10e0dc6612c9de1b29124a246f\"" May 10 00:45:38.295403 env[1184]: time="2025-05-10T00:45:38.295350779Z" level=info msg="StartContainer for \"298ba15ed05d14ed8a29da2362f858601a71bc10e0dc6612c9de1b29124a246f\"" May 10 00:45:38.350502 systemd[1]: run-containerd-runc-k8s.io-298ba15ed05d14ed8a29da2362f858601a71bc10e0dc6612c9de1b29124a246f-runc.xwkmUM.mount: Deactivated successfully. May 10 00:45:38.357202 systemd[1]: Started cri-containerd-298ba15ed05d14ed8a29da2362f858601a71bc10e0dc6612c9de1b29124a246f.scope. May 10 00:45:38.375583 kernel: kauditd_printk_skb: 185 callbacks suppressed May 10 00:45:38.375806 kernel: audit: type=1400 audit(1746837938.369:1310): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:38.369000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:38.369000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:38.379969 kernel: audit: type=1400 audit(1746837938.369:1309): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:38.369000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002283360 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:45:38.388905 kernel: audit: type=1300 audit(1746837938.369:1309): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002283360 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:45:38.389104 kernel: audit: type=1327 audit(1746837938.369:1309): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:38.369000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:38.371000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:38.394405 kernel: audit: type=1400 audit(1746837938.371:1311): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:38.397197 kernel: audit: type=1300 audit(1746837938.371:1311): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002283380 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:45:38.371000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002283380 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:45:38.371000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:38.405888 kernel: audit: type=1327 audit(1746837938.371:1311): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:38.369000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ed3c20 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:45:38.412763 kernel: audit: type=1300 audit(1746837938.369:1310): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ed3c20 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:45:38.369000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:38.417799 kernel: audit: type=1327 audit(1746837938.369:1310): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:38.376000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:38.422780 kernel: audit: type=1400 audit(1746837938.376:1312): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:38.376000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002ed3c40 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:45:38.376000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fea05376d48 items=0 ppid=3329 pid=4282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239386261313565643035643134656438613239646132333632663835 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit: BPF prog-id=198 op=LOAD May 10 00:45:38.393000 audit[4282]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00039a6f8 items=0 ppid=3329 pid=4282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239386261313565643035643134656438613239646132333632663835 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit: BPF prog-id=199 op=LOAD May 10 00:45:38.393000 audit[4282]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00039a748 items=0 ppid=3329 pid=4282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239386261313565643035643134656438613239646132333632663835 May 10 00:45:38.393000 audit: BPF prog-id=199 op=UNLOAD May 10 00:45:38.393000 audit: BPF prog-id=198 op=UNLOAD May 10 00:45:38.393000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.393000 audit: BPF prog-id=200 op=LOAD May 10 00:45:38.393000 audit[4282]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00039a7d8 items=0 ppid=3329 pid=4282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239386261313565643035643134656438613239646132333632663835 May 10 00:45:38.446247 env[1184]: time="2025-05-10T00:45:38.446170509Z" level=info msg="StartContainer for \"298ba15ed05d14ed8a29da2362f858601a71bc10e0dc6612c9de1b29124a246f\" returns successfully" May 10 00:45:38.594291 kubelet[2019]: I0510 00:45:38.594085 2019 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-84rrs" podStartSLOduration=27.102433783 podStartE2EDuration="40.594049374s" podCreationTimestamp="2025-05-10 00:44:58 +0000 UTC" firstStartedPulling="2025-05-10 00:45:24.75909013 +0000 UTC m=+46.251242390" lastFinishedPulling="2025-05-10 00:45:38.250705717 +0000 UTC m=+59.742857981" observedRunningTime="2025-05-10 00:45:38.593675853 +0000 UTC m=+60.085828128" watchObservedRunningTime="2025-05-10 00:45:38.594049374 +0000 UTC m=+60.086201647" May 10 00:45:38.859937 env[1184]: time="2025-05-10T00:45:38.859277029Z" level=info msg="StopPodSandbox for \"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\"" May 10 00:45:39.107693 env[1184]: 2025-05-10 00:45:39.019 [WARNING][4329] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2b9a7249-2bd8-45a6-8253-10147c8c745b", ResourceVersion:"1058", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2", Pod:"csi-node-driver-84rrs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.54.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali83d0c40d76c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:39.107693 env[1184]: 2025-05-10 00:45:39.021 [INFO][4329] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" May 10 00:45:39.107693 env[1184]: 2025-05-10 00:45:39.022 [INFO][4329] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" iface="eth0" netns="" May 10 00:45:39.107693 env[1184]: 2025-05-10 00:45:39.022 [INFO][4329] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" May 10 00:45:39.107693 env[1184]: 2025-05-10 00:45:39.022 [INFO][4329] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" May 10 00:45:39.107693 env[1184]: 2025-05-10 00:45:39.076 [INFO][4336] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" HandleID="k8s-pod-network.142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" Workload="ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0" May 10 00:45:39.107693 env[1184]: 2025-05-10 00:45:39.077 [INFO][4336] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:39.107693 env[1184]: 2025-05-10 00:45:39.077 [INFO][4336] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:39.107693 env[1184]: 2025-05-10 00:45:39.094 [WARNING][4336] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" HandleID="k8s-pod-network.142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" Workload="ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0" May 10 00:45:39.107693 env[1184]: 2025-05-10 00:45:39.095 [INFO][4336] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" HandleID="k8s-pod-network.142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" Workload="ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0" May 10 00:45:39.107693 env[1184]: 2025-05-10 00:45:39.098 [INFO][4336] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:39.107693 env[1184]: 2025-05-10 00:45:39.103 [INFO][4329] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" May 10 00:45:39.108964 env[1184]: time="2025-05-10T00:45:39.108915785Z" level=info msg="TearDown network for sandbox \"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\" successfully" May 10 00:45:39.109057 env[1184]: time="2025-05-10T00:45:39.109039103Z" level=info msg="StopPodSandbox for \"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\" returns successfully" May 10 00:45:39.110311 env[1184]: time="2025-05-10T00:45:39.110125195Z" level=info msg="RemovePodSandbox for \"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\"" May 10 00:45:39.110311 env[1184]: time="2025-05-10T00:45:39.110198388Z" level=info msg="Forcibly stopping sandbox \"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\"" May 10 00:45:39.123666 kubelet[2019]: I0510 00:45:39.123558 2019 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 10 00:45:39.124829 kubelet[2019]: I0510 00:45:39.124790 2019 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 10 00:45:39.342027 env[1184]: 2025-05-10 00:45:39.227 [WARNING][4357] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2b9a7249-2bd8-45a6-8253-10147c8c745b", ResourceVersion:"1058", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"2336da7be4d5b5ab61dcf7911522e60381a32819dadde5465962c2b9dd36dea2", Pod:"csi-node-driver-84rrs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.54.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali83d0c40d76c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:39.342027 env[1184]: 2025-05-10 00:45:39.228 [INFO][4357] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" May 10 00:45:39.342027 env[1184]: 2025-05-10 00:45:39.228 [INFO][4357] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" iface="eth0" netns="" May 10 00:45:39.342027 env[1184]: 2025-05-10 00:45:39.228 [INFO][4357] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" May 10 00:45:39.342027 env[1184]: 2025-05-10 00:45:39.228 [INFO][4357] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" May 10 00:45:39.342027 env[1184]: 2025-05-10 00:45:39.322 [INFO][4364] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" HandleID="k8s-pod-network.142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" Workload="ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0" May 10 00:45:39.342027 env[1184]: 2025-05-10 00:45:39.323 [INFO][4364] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:39.342027 env[1184]: 2025-05-10 00:45:39.323 [INFO][4364] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:39.342027 env[1184]: 2025-05-10 00:45:39.331 [WARNING][4364] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" HandleID="k8s-pod-network.142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" Workload="ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0" May 10 00:45:39.342027 env[1184]: 2025-05-10 00:45:39.331 [INFO][4364] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" HandleID="k8s-pod-network.142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" Workload="ci--3510.3.7--n--3080830dac-k8s-csi--node--driver--84rrs-eth0" May 10 00:45:39.342027 env[1184]: 2025-05-10 00:45:39.335 [INFO][4364] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:39.342027 env[1184]: 2025-05-10 00:45:39.338 [INFO][4357] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da" May 10 00:45:39.344373 env[1184]: time="2025-05-10T00:45:39.342071173Z" level=info msg="TearDown network for sandbox \"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\" successfully" May 10 00:45:39.347479 env[1184]: time="2025-05-10T00:45:39.347402482Z" level=info msg="RemovePodSandbox \"142d63fe427519abeaea635f31808e518a46c013381e15ed079db0ca322546da\" returns successfully" May 10 00:45:39.349550 env[1184]: time="2025-05-10T00:45:39.349491753Z" level=info msg="StopPodSandbox for \"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\"" May 10 00:45:39.496149 env[1184]: 2025-05-10 00:45:39.428 [WARNING][4387] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0", GenerateName:"calico-apiserver-59f5cd6df4-", Namespace:"calico-apiserver", SelfLink:"", UID:"131c747f-d395-4c4b-8559-06ad886de3fa", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"59f5cd6df4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d", Pod:"calico-apiserver-59f5cd6df4-k8vdw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali847218ba571", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:39.496149 env[1184]: 2025-05-10 00:45:39.429 [INFO][4387] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" May 10 00:45:39.496149 env[1184]: 2025-05-10 00:45:39.429 [INFO][4387] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" iface="eth0" netns="" May 10 00:45:39.496149 env[1184]: 2025-05-10 00:45:39.429 [INFO][4387] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" May 10 00:45:39.496149 env[1184]: 2025-05-10 00:45:39.429 [INFO][4387] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" May 10 00:45:39.496149 env[1184]: 2025-05-10 00:45:39.477 [INFO][4394] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" HandleID="k8s-pod-network.9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0" May 10 00:45:39.496149 env[1184]: 2025-05-10 00:45:39.477 [INFO][4394] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:39.496149 env[1184]: 2025-05-10 00:45:39.477 [INFO][4394] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:39.496149 env[1184]: 2025-05-10 00:45:39.486 [WARNING][4394] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" HandleID="k8s-pod-network.9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0" May 10 00:45:39.496149 env[1184]: 2025-05-10 00:45:39.486 [INFO][4394] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" HandleID="k8s-pod-network.9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0" May 10 00:45:39.496149 env[1184]: 2025-05-10 00:45:39.490 [INFO][4394] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:39.496149 env[1184]: 2025-05-10 00:45:39.492 [INFO][4387] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" May 10 00:45:39.497295 env[1184]: time="2025-05-10T00:45:39.496222719Z" level=info msg="TearDown network for sandbox \"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\" successfully" May 10 00:45:39.497295 env[1184]: time="2025-05-10T00:45:39.496266708Z" level=info msg="StopPodSandbox for \"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\" returns successfully" May 10 00:45:39.498402 env[1184]: time="2025-05-10T00:45:39.498344872Z" level=info msg="RemovePodSandbox for \"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\"" May 10 00:45:39.498617 env[1184]: time="2025-05-10T00:45:39.498393807Z" level=info msg="Forcibly stopping sandbox \"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\"" May 10 00:45:39.675852 env[1184]: 2025-05-10 00:45:39.604 [WARNING][4412] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0", GenerateName:"calico-apiserver-59f5cd6df4-", Namespace:"calico-apiserver", SelfLink:"", UID:"131c747f-d395-4c4b-8559-06ad886de3fa", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"59f5cd6df4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"01b92e3ef00775e491db498dfb30778aadf02977250b4320ca4615358ea95f8d", Pod:"calico-apiserver-59f5cd6df4-k8vdw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali847218ba571", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:39.675852 env[1184]: 2025-05-10 00:45:39.605 [INFO][4412] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" May 10 00:45:39.675852 env[1184]: 2025-05-10 00:45:39.605 [INFO][4412] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" iface="eth0" netns="" May 10 00:45:39.675852 env[1184]: 2025-05-10 00:45:39.605 [INFO][4412] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" May 10 00:45:39.675852 env[1184]: 2025-05-10 00:45:39.605 [INFO][4412] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" May 10 00:45:39.675852 env[1184]: 2025-05-10 00:45:39.656 [INFO][4420] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" HandleID="k8s-pod-network.9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0" May 10 00:45:39.675852 env[1184]: 2025-05-10 00:45:39.656 [INFO][4420] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:39.675852 env[1184]: 2025-05-10 00:45:39.656 [INFO][4420] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:39.675852 env[1184]: 2025-05-10 00:45:39.666 [WARNING][4420] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" HandleID="k8s-pod-network.9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0" May 10 00:45:39.675852 env[1184]: 2025-05-10 00:45:39.666 [INFO][4420] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" HandleID="k8s-pod-network.9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--k8vdw-eth0" May 10 00:45:39.675852 env[1184]: 2025-05-10 00:45:39.670 [INFO][4420] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:39.675852 env[1184]: 2025-05-10 00:45:39.673 [INFO][4412] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39" May 10 00:45:39.676576 env[1184]: time="2025-05-10T00:45:39.675885934Z" level=info msg="TearDown network for sandbox \"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\" successfully" May 10 00:45:39.679950 env[1184]: time="2025-05-10T00:45:39.679790578Z" level=info msg="RemovePodSandbox \"9694cfa82cd6fb8034616965f959981faa1d81cdade5134fb4323a8b9a7bec39\" returns successfully" May 10 00:45:39.696229 env[1184]: time="2025-05-10T00:45:39.696156351Z" level=info msg="StopPodSandbox for \"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\"" May 10 00:45:39.894069 env[1184]: 2025-05-10 00:45:39.822 [WARNING][4440] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"23cdbc27-8426-4777-969e-b9508b2b58c7", ResourceVersion:"956", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473", Pod:"coredns-7db6d8ff4d-g6mxn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali18c983a7d40", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:39.894069 env[1184]: 2025-05-10 00:45:39.823 [INFO][4440] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" May 10 00:45:39.894069 env[1184]: 2025-05-10 00:45:39.823 [INFO][4440] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" iface="eth0" netns="" May 10 00:45:39.894069 env[1184]: 2025-05-10 00:45:39.823 [INFO][4440] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" May 10 00:45:39.894069 env[1184]: 2025-05-10 00:45:39.823 [INFO][4440] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" May 10 00:45:39.894069 env[1184]: 2025-05-10 00:45:39.876 [INFO][4447] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" HandleID="k8s-pod-network.b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0" May 10 00:45:39.894069 env[1184]: 2025-05-10 00:45:39.876 [INFO][4447] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:39.894069 env[1184]: 2025-05-10 00:45:39.876 [INFO][4447] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:39.894069 env[1184]: 2025-05-10 00:45:39.885 [WARNING][4447] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" HandleID="k8s-pod-network.b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0" May 10 00:45:39.894069 env[1184]: 2025-05-10 00:45:39.885 [INFO][4447] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" HandleID="k8s-pod-network.b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0" May 10 00:45:39.894069 env[1184]: 2025-05-10 00:45:39.888 [INFO][4447] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:39.894069 env[1184]: 2025-05-10 00:45:39.891 [INFO][4440] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" May 10 00:45:39.894823 env[1184]: time="2025-05-10T00:45:39.894124096Z" level=info msg="TearDown network for sandbox \"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\" successfully" May 10 00:45:39.894823 env[1184]: time="2025-05-10T00:45:39.894161314Z" level=info msg="StopPodSandbox for \"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\" returns successfully" May 10 00:45:39.895595 env[1184]: time="2025-05-10T00:45:39.895551564Z" level=info msg="RemovePodSandbox for \"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\"" May 10 00:45:39.895823 env[1184]: time="2025-05-10T00:45:39.895771558Z" level=info msg="Forcibly stopping sandbox \"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\"" May 10 00:45:40.046333 env[1184]: 2025-05-10 00:45:39.968 [WARNING][4468] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"23cdbc27-8426-4777-969e-b9508b2b58c7", ResourceVersion:"956", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"5e77be6fdb293aed081e160b060abf9d211b61739853037abc1461172de0b473", Pod:"coredns-7db6d8ff4d-g6mxn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali18c983a7d40", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:40.046333 env[1184]: 2025-05-10 00:45:39.969 [INFO][4468] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" May 10 00:45:40.046333 env[1184]: 2025-05-10 00:45:39.969 [INFO][4468] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" iface="eth0" netns="" May 10 00:45:40.046333 env[1184]: 2025-05-10 00:45:39.969 [INFO][4468] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" May 10 00:45:40.046333 env[1184]: 2025-05-10 00:45:39.969 [INFO][4468] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" May 10 00:45:40.046333 env[1184]: 2025-05-10 00:45:40.020 [INFO][4476] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" HandleID="k8s-pod-network.b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0" May 10 00:45:40.046333 env[1184]: 2025-05-10 00:45:40.020 [INFO][4476] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:40.046333 env[1184]: 2025-05-10 00:45:40.020 [INFO][4476] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:40.046333 env[1184]: 2025-05-10 00:45:40.037 [WARNING][4476] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" HandleID="k8s-pod-network.b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0" May 10 00:45:40.046333 env[1184]: 2025-05-10 00:45:40.037 [INFO][4476] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" HandleID="k8s-pod-network.b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--g6mxn-eth0" May 10 00:45:40.046333 env[1184]: 2025-05-10 00:45:40.040 [INFO][4476] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:40.046333 env[1184]: 2025-05-10 00:45:40.042 [INFO][4468] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75" May 10 00:45:40.047426 env[1184]: time="2025-05-10T00:45:40.046407399Z" level=info msg="TearDown network for sandbox \"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\" successfully" May 10 00:45:40.050398 env[1184]: time="2025-05-10T00:45:40.050338560Z" level=info msg="RemovePodSandbox \"b9a9f4b4d0d42c83362c21d0a1f145fabcac41f0c987279ee0dad2761beace75\" returns successfully" May 10 00:45:40.051407 env[1184]: time="2025-05-10T00:45:40.051345680Z" level=info msg="StopPodSandbox for \"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\"" May 10 00:45:40.215065 env[1184]: 2025-05-10 00:45:40.134 [WARNING][4495] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0", GenerateName:"calico-kube-controllers-5fb854744b-", Namespace:"calico-system", SelfLink:"", UID:"bbc2d3bc-030b-407e-bd10-438dc51276da", ResourceVersion:"944", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5fb854744b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c", Pod:"calico-kube-controllers-5fb854744b-zgtlb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.54.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali827dddf4beb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:40.215065 env[1184]: 2025-05-10 00:45:40.134 [INFO][4495] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" May 10 00:45:40.215065 env[1184]: 2025-05-10 00:45:40.134 [INFO][4495] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" iface="eth0" netns="" May 10 00:45:40.215065 env[1184]: 2025-05-10 00:45:40.134 [INFO][4495] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" May 10 00:45:40.215065 env[1184]: 2025-05-10 00:45:40.134 [INFO][4495] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" May 10 00:45:40.215065 env[1184]: 2025-05-10 00:45:40.181 [INFO][4502] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" HandleID="k8s-pod-network.dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0" May 10 00:45:40.215065 env[1184]: 2025-05-10 00:45:40.182 [INFO][4502] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:40.215065 env[1184]: 2025-05-10 00:45:40.182 [INFO][4502] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:40.215065 env[1184]: 2025-05-10 00:45:40.198 [WARNING][4502] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" HandleID="k8s-pod-network.dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0" May 10 00:45:40.215065 env[1184]: 2025-05-10 00:45:40.198 [INFO][4502] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" HandleID="k8s-pod-network.dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0" May 10 00:45:40.215065 env[1184]: 2025-05-10 00:45:40.203 [INFO][4502] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:40.215065 env[1184]: 2025-05-10 00:45:40.212 [INFO][4495] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" May 10 00:45:40.216151 env[1184]: time="2025-05-10T00:45:40.216087317Z" level=info msg="TearDown network for sandbox \"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\" successfully" May 10 00:45:40.216303 env[1184]: time="2025-05-10T00:45:40.216278656Z" level=info msg="StopPodSandbox for \"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\" returns successfully" May 10 00:45:40.217279 env[1184]: time="2025-05-10T00:45:40.217137868Z" level=info msg="RemovePodSandbox for \"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\"" May 10 00:45:40.217539 env[1184]: time="2025-05-10T00:45:40.217452625Z" level=info msg="Forcibly stopping sandbox \"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\"" May 10 00:45:40.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-143.198.48.176:22-139.178.68.195:40328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:40.248540 systemd[1]: Started sshd@12-143.198.48.176:22-139.178.68.195:40328.service. May 10 00:45:40.331000 audit[4526]: USER_ACCT pid=4526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:40.332735 sshd[4526]: Accepted publickey for core from 139.178.68.195 port 40328 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:45:40.334000 audit[4526]: CRED_ACQ pid=4526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:40.334000 audit[4526]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb90cc1d0 a2=3 a3=0 items=0 ppid=1 pid=4526 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:40.334000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:45:40.336925 sshd[4526]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:40.347880 systemd[1]: Started session-13.scope. May 10 00:45:40.349447 systemd-logind[1176]: New session 13 of user core. May 10 00:45:40.359000 audit[4526]: USER_START pid=4526 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:40.363000 audit[4535]: CRED_ACQ pid=4535 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:40.407101 env[1184]: 2025-05-10 00:45:40.319 [WARNING][4521] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0", GenerateName:"calico-kube-controllers-5fb854744b-", Namespace:"calico-system", SelfLink:"", UID:"bbc2d3bc-030b-407e-bd10-438dc51276da", ResourceVersion:"944", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5fb854744b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c", Pod:"calico-kube-controllers-5fb854744b-zgtlb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.54.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali827dddf4beb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:40.407101 env[1184]: 2025-05-10 00:45:40.320 [INFO][4521] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" May 10 00:45:40.407101 env[1184]: 2025-05-10 00:45:40.320 [INFO][4521] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" iface="eth0" netns="" May 10 00:45:40.407101 env[1184]: 2025-05-10 00:45:40.320 [INFO][4521] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" May 10 00:45:40.407101 env[1184]: 2025-05-10 00:45:40.320 [INFO][4521] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" May 10 00:45:40.407101 env[1184]: 2025-05-10 00:45:40.386 [INFO][4531] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" HandleID="k8s-pod-network.dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0" May 10 00:45:40.407101 env[1184]: 2025-05-10 00:45:40.386 [INFO][4531] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:40.407101 env[1184]: 2025-05-10 00:45:40.386 [INFO][4531] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:40.407101 env[1184]: 2025-05-10 00:45:40.395 [WARNING][4531] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" HandleID="k8s-pod-network.dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0" May 10 00:45:40.407101 env[1184]: 2025-05-10 00:45:40.395 [INFO][4531] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" HandleID="k8s-pod-network.dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--kube--controllers--5fb854744b--zgtlb-eth0" May 10 00:45:40.407101 env[1184]: 2025-05-10 00:45:40.399 [INFO][4531] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:40.407101 env[1184]: 2025-05-10 00:45:40.403 [INFO][4521] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875" May 10 00:45:40.409063 env[1184]: time="2025-05-10T00:45:40.408049659Z" level=info msg="TearDown network for sandbox \"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\" successfully" May 10 00:45:40.414998 env[1184]: time="2025-05-10T00:45:40.414933496Z" level=info msg="RemovePodSandbox \"dcf007c9b76190833a2f0f186ceb4a191cd68e831a1a72936f1cefbb07078875\" returns successfully" May 10 00:45:40.418050 env[1184]: time="2025-05-10T00:45:40.417883970Z" level=info msg="StopPodSandbox for \"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\"" May 10 00:45:40.714954 env[1184]: 2025-05-10 00:45:40.591 [WARNING][4554] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0", GenerateName:"calico-apiserver-59f5cd6df4-", Namespace:"calico-apiserver", SelfLink:"", UID:"92e30503-0699-4ea6-bf79-a0a97419537f", ResourceVersion:"1000", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"59f5cd6df4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5", Pod:"calico-apiserver-59f5cd6df4-9cds2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2b9bc456de6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:40.714954 env[1184]: 2025-05-10 00:45:40.593 [INFO][4554] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" May 10 00:45:40.714954 env[1184]: 2025-05-10 00:45:40.594 [INFO][4554] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" iface="eth0" netns="" May 10 00:45:40.714954 env[1184]: 2025-05-10 00:45:40.594 [INFO][4554] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" May 10 00:45:40.714954 env[1184]: 2025-05-10 00:45:40.594 [INFO][4554] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" May 10 00:45:40.714954 env[1184]: 2025-05-10 00:45:40.670 [INFO][4564] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" HandleID="k8s-pod-network.82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0" May 10 00:45:40.714954 env[1184]: 2025-05-10 00:45:40.673 [INFO][4564] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:40.714954 env[1184]: 2025-05-10 00:45:40.677 [INFO][4564] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:40.714954 env[1184]: 2025-05-10 00:45:40.695 [WARNING][4564] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" HandleID="k8s-pod-network.82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0" May 10 00:45:40.714954 env[1184]: 2025-05-10 00:45:40.695 [INFO][4564] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" HandleID="k8s-pod-network.82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0" May 10 00:45:40.714954 env[1184]: 2025-05-10 00:45:40.701 [INFO][4564] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:40.714954 env[1184]: 2025-05-10 00:45:40.706 [INFO][4554] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" May 10 00:45:40.714954 env[1184]: time="2025-05-10T00:45:40.714630871Z" level=info msg="TearDown network for sandbox \"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\" successfully" May 10 00:45:40.714954 env[1184]: time="2025-05-10T00:45:40.714683477Z" level=info msg="StopPodSandbox for \"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\" returns successfully" May 10 00:45:40.720163 env[1184]: time="2025-05-10T00:45:40.718683972Z" level=info msg="RemovePodSandbox for \"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\"" May 10 00:45:40.720500 env[1184]: time="2025-05-10T00:45:40.720442468Z" level=info msg="Forcibly stopping sandbox \"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\"" May 10 00:45:40.997068 env[1184]: 2025-05-10 00:45:40.887 [WARNING][4583] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0", GenerateName:"calico-apiserver-59f5cd6df4-", Namespace:"calico-apiserver", SelfLink:"", UID:"92e30503-0699-4ea6-bf79-a0a97419537f", ResourceVersion:"1000", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"59f5cd6df4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"f695f7d65260f3a7fa443ac45570af9dc8850a42218e8b43404a033f156b55d5", Pod:"calico-apiserver-59f5cd6df4-9cds2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2b9bc456de6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:40.997068 env[1184]: 2025-05-10 00:45:40.888 [INFO][4583] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" May 10 00:45:40.997068 env[1184]: 2025-05-10 00:45:40.888 [INFO][4583] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" iface="eth0" netns="" May 10 00:45:40.997068 env[1184]: 2025-05-10 00:45:40.888 [INFO][4583] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" May 10 00:45:40.997068 env[1184]: 2025-05-10 00:45:40.888 [INFO][4583] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" May 10 00:45:40.997068 env[1184]: 2025-05-10 00:45:40.969 [INFO][4590] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" HandleID="k8s-pod-network.82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0" May 10 00:45:40.997068 env[1184]: 2025-05-10 00:45:40.971 [INFO][4590] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:40.997068 env[1184]: 2025-05-10 00:45:40.972 [INFO][4590] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:40.997068 env[1184]: 2025-05-10 00:45:40.984 [WARNING][4590] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" HandleID="k8s-pod-network.82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0" May 10 00:45:40.997068 env[1184]: 2025-05-10 00:45:40.984 [INFO][4590] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" HandleID="k8s-pod-network.82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" Workload="ci--3510.3.7--n--3080830dac-k8s-calico--apiserver--59f5cd6df4--9cds2-eth0" May 10 00:45:40.997068 env[1184]: 2025-05-10 00:45:40.987 [INFO][4590] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:40.997068 env[1184]: 2025-05-10 00:45:40.991 [INFO][4583] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128" May 10 00:45:40.997068 env[1184]: time="2025-05-10T00:45:40.997002462Z" level=info msg="TearDown network for sandbox \"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\" successfully" May 10 00:45:41.004577 env[1184]: time="2025-05-10T00:45:41.004454735Z" level=info msg="RemovePodSandbox \"82536dd7a77f6caca64a7a1f4505db19dd57514ad88e3c62cfbe54a40b526128\" returns successfully" May 10 00:45:41.007137 env[1184]: time="2025-05-10T00:45:41.007078467Z" level=info msg="StopPodSandbox for \"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\"" May 10 00:45:41.290863 env[1184]: 2025-05-10 00:45:41.163 [WARNING][4609] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"096fc47e-332e-45a4-ba28-0d240852b6c0", ResourceVersion:"952", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3", Pod:"coredns-7db6d8ff4d-w2pfg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia522b3b8512", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:41.290863 env[1184]: 2025-05-10 00:45:41.163 [INFO][4609] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" May 10 00:45:41.290863 env[1184]: 2025-05-10 00:45:41.163 [INFO][4609] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" iface="eth0" netns="" May 10 00:45:41.290863 env[1184]: 2025-05-10 00:45:41.163 [INFO][4609] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" May 10 00:45:41.290863 env[1184]: 2025-05-10 00:45:41.163 [INFO][4609] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" May 10 00:45:41.290863 env[1184]: 2025-05-10 00:45:41.255 [INFO][4616] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" HandleID="k8s-pod-network.dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0" May 10 00:45:41.290863 env[1184]: 2025-05-10 00:45:41.256 [INFO][4616] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:41.290863 env[1184]: 2025-05-10 00:45:41.257 [INFO][4616] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:41.290863 env[1184]: 2025-05-10 00:45:41.280 [WARNING][4616] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" HandleID="k8s-pod-network.dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0" May 10 00:45:41.290863 env[1184]: 2025-05-10 00:45:41.280 [INFO][4616] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" HandleID="k8s-pod-network.dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0" May 10 00:45:41.290863 env[1184]: 2025-05-10 00:45:41.283 [INFO][4616] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:41.290863 env[1184]: 2025-05-10 00:45:41.287 [INFO][4609] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" May 10 00:45:41.292039 env[1184]: time="2025-05-10T00:45:41.291820743Z" level=info msg="TearDown network for sandbox \"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\" successfully" May 10 00:45:41.292186 env[1184]: time="2025-05-10T00:45:41.292160349Z" level=info msg="StopPodSandbox for \"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\" returns successfully" May 10 00:45:41.294280 env[1184]: time="2025-05-10T00:45:41.293741491Z" level=info msg="RemovePodSandbox for \"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\"" May 10 00:45:41.294655 env[1184]: time="2025-05-10T00:45:41.294569949Z" level=info msg="Forcibly stopping sandbox \"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\"" May 10 00:45:41.386081 sshd[4526]: pam_unix(sshd:session): session closed for user core May 10 00:45:41.388000 audit[4526]: USER_END pid=4526 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:41.388000 audit[4526]: CRED_DISP pid=4526 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:41.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-143.198.48.176:22-139.178.68.195:40328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:41.392096 systemd[1]: sshd@12-143.198.48.176:22-139.178.68.195:40328.service: Deactivated successfully. May 10 00:45:41.393558 systemd[1]: session-13.scope: Deactivated successfully. May 10 00:45:41.395588 systemd-logind[1176]: Session 13 logged out. Waiting for processes to exit. May 10 00:45:41.397858 systemd-logind[1176]: Removed session 13. May 10 00:45:41.518898 env[1184]: 2025-05-10 00:45:41.437 [WARNING][4640] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"096fc47e-332e-45a4-ba28-0d240852b6c0", ResourceVersion:"952", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-3080830dac", ContainerID:"eb32dd449882c48c7ba06cc27b92550a1dc7526b0a86e24eee8671933216e3e3", Pod:"coredns-7db6d8ff4d-w2pfg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia522b3b8512", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:41.518898 env[1184]: 2025-05-10 00:45:41.438 [INFO][4640] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" May 10 00:45:41.518898 env[1184]: 2025-05-10 00:45:41.438 [INFO][4640] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" iface="eth0" netns="" May 10 00:45:41.518898 env[1184]: 2025-05-10 00:45:41.438 [INFO][4640] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" May 10 00:45:41.518898 env[1184]: 2025-05-10 00:45:41.438 [INFO][4640] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" May 10 00:45:41.518898 env[1184]: 2025-05-10 00:45:41.500 [INFO][4648] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" HandleID="k8s-pod-network.dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0" May 10 00:45:41.518898 env[1184]: 2025-05-10 00:45:41.501 [INFO][4648] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:41.518898 env[1184]: 2025-05-10 00:45:41.501 [INFO][4648] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:41.518898 env[1184]: 2025-05-10 00:45:41.509 [WARNING][4648] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" HandleID="k8s-pod-network.dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0" May 10 00:45:41.518898 env[1184]: 2025-05-10 00:45:41.509 [INFO][4648] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" HandleID="k8s-pod-network.dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" Workload="ci--3510.3.7--n--3080830dac-k8s-coredns--7db6d8ff4d--w2pfg-eth0" May 10 00:45:41.518898 env[1184]: 2025-05-10 00:45:41.513 [INFO][4648] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:41.518898 env[1184]: 2025-05-10 00:45:41.516 [INFO][4640] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f" May 10 00:45:41.520647 env[1184]: time="2025-05-10T00:45:41.520277247Z" level=info msg="TearDown network for sandbox \"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\" successfully" May 10 00:45:41.524592 env[1184]: time="2025-05-10T00:45:41.524475933Z" level=info msg="RemovePodSandbox \"dedfd4488e739645a13fc0b7fc501901f5437ffc2c094bf33ada12ac27e89b3f\" returns successfully" May 10 00:45:42.376952 env[1184]: time="2025-05-10T00:45:42.376882787Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:42.381648 env[1184]: time="2025-05-10T00:45:42.381601105Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:42.383074 env[1184]: time="2025-05-10T00:45:42.383033103Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:42.387083 env[1184]: time="2025-05-10T00:45:42.387011133Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:42.387939 env[1184]: time="2025-05-10T00:45:42.387883645Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 10 00:45:42.472431 env[1184]: time="2025-05-10T00:45:42.472242989Z" level=info msg="CreateContainer within sandbox \"34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 10 00:45:42.490413 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2571462506.mount: Deactivated successfully. May 10 00:45:42.496160 env[1184]: time="2025-05-10T00:45:42.496092908Z" level=info msg="CreateContainer within sandbox \"34746fc95eb6c9442e86373b33d686a6a598d374cab7fe7cd6f20f2c93ce7b6c\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"f7ee001fae20373f2b6300d47243b9e013996bae09977afcba7aeac49b2f229b\"" May 10 00:45:42.497662 env[1184]: time="2025-05-10T00:45:42.497605862Z" level=info msg="StartContainer for \"f7ee001fae20373f2b6300d47243b9e013996bae09977afcba7aeac49b2f229b\"" May 10 00:45:42.529455 systemd[1]: Started cri-containerd-f7ee001fae20373f2b6300d47243b9e013996bae09977afcba7aeac49b2f229b.scope. May 10 00:45:42.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.564000 audit: BPF prog-id=201 op=LOAD May 10 00:45:42.566000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.566000 audit[4664]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4073 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:42.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637656530303166616532303337336632623633303064343732343362 May 10 00:45:42.566000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.566000 audit[4664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4073 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:42.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637656530303166616532303337336632623633303064343732343362 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit: BPF prog-id=202 op=LOAD May 10 00:45:42.567000 audit[4664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002171f0 items=0 ppid=4073 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:42.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637656530303166616532303337336632623633303064343732343362 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit: BPF prog-id=203 op=LOAD May 10 00:45:42.567000 audit[4664]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000217238 items=0 ppid=4073 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:42.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637656530303166616532303337336632623633303064343732343362 May 10 00:45:42.567000 audit: BPF prog-id=203 op=UNLOAD May 10 00:45:42.567000 audit: BPF prog-id=202 op=UNLOAD May 10 00:45:42.567000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:42.567000 audit: BPF prog-id=204 op=LOAD May 10 00:45:42.567000 audit[4664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000217648 items=0 ppid=4073 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:42.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637656530303166616532303337336632623633303064343732343362 May 10 00:45:42.624212 env[1184]: time="2025-05-10T00:45:42.624136583Z" level=info msg="StartContainer for \"f7ee001fae20373f2b6300d47243b9e013996bae09977afcba7aeac49b2f229b\" returns successfully" May 10 00:45:43.655090 systemd[1]: run-containerd-runc-k8s.io-f7ee001fae20373f2b6300d47243b9e013996bae09977afcba7aeac49b2f229b-runc.snxjGp.mount: Deactivated successfully. May 10 00:45:43.734391 kubelet[2019]: I0510 00:45:43.734269 2019 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5fb854744b-zgtlb" podStartSLOduration=31.736618796 podStartE2EDuration="44.734227747s" podCreationTimestamp="2025-05-10 00:44:59 +0000 UTC" firstStartedPulling="2025-05-10 00:45:29.392409596 +0000 UTC m=+50.884561845" lastFinishedPulling="2025-05-10 00:45:42.390018544 +0000 UTC m=+63.882170796" observedRunningTime="2025-05-10 00:45:43.663578392 +0000 UTC m=+65.155730661" watchObservedRunningTime="2025-05-10 00:45:43.734227747 +0000 UTC m=+65.226380016" May 10 00:45:46.399374 systemd[1]: Started sshd@13-143.198.48.176:22-139.178.68.195:52576.service. May 10 00:45:46.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-143.198.48.176:22-139.178.68.195:52576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:46.402501 kernel: kauditd_printk_skb: 113 callbacks suppressed May 10 00:45:46.402701 kernel: audit: type=1130 audit(1746837946.399:1346): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-143.198.48.176:22-139.178.68.195:52576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:46.485000 audit[4709]: USER_ACCT pid=4709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:46.487748 sshd[4709]: Accepted publickey for core from 139.178.68.195 port 52576 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:45:46.489912 kernel: audit: type=1101 audit(1746837946.485:1347): pid=4709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:46.491000 audit[4709]: CRED_ACQ pid=4709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:46.499036 kernel: audit: type=1103 audit(1746837946.491:1348): pid=4709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:46.499217 kernel: audit: type=1006 audit(1746837946.491:1349): pid=4709 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 10 00:45:46.499266 kernel: audit: type=1300 audit(1746837946.491:1349): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3b4e7d00 a2=3 a3=0 items=0 ppid=1 pid=4709 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:46.503877 kernel: audit: type=1327 audit(1746837946.491:1349): proctitle=737368643A20636F7265205B707269765D May 10 00:45:46.491000 audit[4709]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3b4e7d00 a2=3 a3=0 items=0 ppid=1 pid=4709 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:46.491000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:45:46.505992 sshd[4709]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:46.514317 systemd[1]: Started session-14.scope. May 10 00:45:46.515473 systemd-logind[1176]: New session 14 of user core. May 10 00:45:46.522000 audit[4709]: USER_START pid=4709 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:46.527000 audit[4711]: CRED_ACQ pid=4711 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:46.531370 kernel: audit: type=1105 audit(1746837946.522:1350): pid=4709 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:46.531518 kernel: audit: type=1103 audit(1746837946.527:1351): pid=4711 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:46.841437 sshd[4709]: pam_unix(sshd:session): session closed for user core May 10 00:45:46.843000 audit[4709]: USER_END pid=4709 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:46.844000 audit[4709]: CRED_DISP pid=4709 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:46.852097 kernel: audit: type=1106 audit(1746837946.843:1352): pid=4709 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:46.852256 kernel: audit: type=1104 audit(1746837946.844:1353): pid=4709 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:46.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-143.198.48.176:22-139.178.68.195:52576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:46.853126 systemd[1]: sshd@13-143.198.48.176:22-139.178.68.195:52576.service: Deactivated successfully. May 10 00:45:46.854229 systemd[1]: session-14.scope: Deactivated successfully. May 10 00:45:46.855533 systemd-logind[1176]: Session 14 logged out. Waiting for processes to exit. May 10 00:45:46.856944 systemd-logind[1176]: Removed session 14. May 10 00:45:46.881182 kubelet[2019]: I0510 00:45:46.881044 2019 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:45:46.949000 audit[4721]: NETFILTER_CFG table=filter:115 family=2 entries=8 op=nft_register_rule pid=4721 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:46.949000 audit[4721]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffeaa155c60 a2=0 a3=7ffeaa155c4c items=0 ppid=2170 pid=4721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:46.949000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:46.954000 audit[4721]: NETFILTER_CFG table=nat:116 family=2 entries=34 op=nft_register_chain pid=4721 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:46.954000 audit[4721]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffeaa155c60 a2=0 a3=7ffeaa155c4c items=0 ppid=2170 pid=4721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:46.954000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:49.817933 kubelet[2019]: E0510 00:45:49.817826 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:45:51.849104 systemd[1]: Started sshd@14-143.198.48.176:22-139.178.68.195:52584.service. May 10 00:45:51.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-143.198.48.176:22-139.178.68.195:52584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:51.851882 kernel: kauditd_printk_skb: 7 callbacks suppressed May 10 00:45:51.852033 kernel: audit: type=1130 audit(1746837951.848:1357): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-143.198.48.176:22-139.178.68.195:52584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:51.914842 sshd[4731]: Accepted publickey for core from 139.178.68.195 port 52584 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:45:51.912000 audit[4731]: USER_ACCT pid=4731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:51.914000 audit[4731]: CRED_ACQ pid=4731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:51.922925 kernel: audit: type=1101 audit(1746837951.912:1358): pid=4731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:51.923101 kernel: audit: type=1103 audit(1746837951.914:1359): pid=4731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:51.925592 kernel: audit: type=1006 audit(1746837951.914:1360): pid=4731 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 10 00:45:51.926167 sshd[4731]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:51.914000 audit[4731]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6993e6c0 a2=3 a3=0 items=0 ppid=1 pid=4731 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.930941 kernel: audit: type=1300 audit(1746837951.914:1360): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6993e6c0 a2=3 a3=0 items=0 ppid=1 pid=4731 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.914000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:45:51.933821 kernel: audit: type=1327 audit(1746837951.914:1360): proctitle=737368643A20636F7265205B707269765D May 10 00:45:51.936678 systemd-logind[1176]: New session 15 of user core. May 10 00:45:51.938183 systemd[1]: Started session-15.scope. May 10 00:45:51.943000 audit[4731]: USER_START pid=4731 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:51.950808 kernel: audit: type=1105 audit(1746837951.943:1361): pid=4731 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:51.949000 audit[4733]: CRED_ACQ pid=4733 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:51.954796 kernel: audit: type=1103 audit(1746837951.949:1362): pid=4733 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:52.285495 sshd[4731]: pam_unix(sshd:session): session closed for user core May 10 00:45:52.285000 audit[4731]: USER_END pid=4731 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:52.288705 systemd[1]: sshd@14-143.198.48.176:22-139.178.68.195:52584.service: Deactivated successfully. May 10 00:45:52.292829 kernel: audit: type=1106 audit(1746837952.285:1363): pid=4731 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:52.293157 kernel: audit: type=1104 audit(1746837952.285:1364): pid=4731 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:52.285000 audit[4731]: CRED_DISP pid=4731 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:52.293692 systemd[1]: session-15.scope: Deactivated successfully. May 10 00:45:52.302602 systemd-logind[1176]: Session 15 logged out. Waiting for processes to exit. May 10 00:45:52.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-143.198.48.176:22-139.178.68.195:52584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:52.304665 systemd-logind[1176]: Removed session 15. May 10 00:45:57.294586 systemd[1]: Started sshd@15-143.198.48.176:22-139.178.68.195:56290.service. May 10 00:45:57.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-143.198.48.176:22-139.178.68.195:56290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:57.296361 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:45:57.300521 kernel: audit: type=1130 audit(1746837957.294:1366): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-143.198.48.176:22-139.178.68.195:56290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:57.359000 audit[4744]: USER_ACCT pid=4744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:57.360207 sshd[4744]: Accepted publickey for core from 139.178.68.195 port 56290 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:45:57.363800 kernel: audit: type=1101 audit(1746837957.359:1367): pid=4744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:57.364000 audit[4744]: CRED_ACQ pid=4744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:57.365871 sshd[4744]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:57.368850 kernel: audit: type=1103 audit(1746837957.364:1368): pid=4744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:57.368954 kernel: audit: type=1006 audit(1746837957.364:1369): pid=4744 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 10 00:45:57.364000 audit[4744]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb4c53d60 a2=3 a3=0 items=0 ppid=1 pid=4744 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:57.379230 kernel: audit: type=1300 audit(1746837957.364:1369): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb4c53d60 a2=3 a3=0 items=0 ppid=1 pid=4744 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:57.378588 systemd-logind[1176]: New session 16 of user core. May 10 00:45:57.379935 systemd[1]: Started session-16.scope. May 10 00:45:57.364000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:45:57.382896 kernel: audit: type=1327 audit(1746837957.364:1369): proctitle=737368643A20636F7265205B707269765D May 10 00:45:57.387000 audit[4744]: USER_START pid=4744 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:57.393823 kernel: audit: type=1105 audit(1746837957.387:1370): pid=4744 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:57.393953 kernel: audit: type=1103 audit(1746837957.390:1371): pid=4746 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:57.390000 audit[4746]: CRED_ACQ pid=4746 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:57.610443 sshd[4744]: pam_unix(sshd:session): session closed for user core May 10 00:45:57.612000 audit[4744]: USER_END pid=4744 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:57.618880 kernel: audit: type=1106 audit(1746837957.612:1372): pid=4744 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:57.613000 audit[4744]: CRED_DISP pid=4744 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:57.624767 kernel: audit: type=1104 audit(1746837957.613:1373): pid=4744 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:57.625660 systemd[1]: Started sshd@16-143.198.48.176:22-139.178.68.195:56296.service. May 10 00:45:57.626443 systemd[1]: sshd@15-143.198.48.176:22-139.178.68.195:56290.service: Deactivated successfully. May 10 00:45:57.627437 systemd[1]: session-16.scope: Deactivated successfully. May 10 00:45:57.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-143.198.48.176:22-139.178.68.195:56296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:57.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-143.198.48.176:22-139.178.68.195:56290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:57.631634 systemd-logind[1176]: Session 16 logged out. Waiting for processes to exit. May 10 00:45:57.633912 systemd-logind[1176]: Removed session 16. May 10 00:45:57.690000 audit[4755]: USER_ACCT pid=4755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:57.691718 sshd[4755]: Accepted publickey for core from 139.178.68.195 port 56296 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:45:57.692000 audit[4755]: CRED_ACQ pid=4755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:57.692000 audit[4755]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5b0199b0 a2=3 a3=0 items=0 ppid=1 pid=4755 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:57.692000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:45:57.694924 sshd[4755]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:57.703364 systemd[1]: Started session-17.scope. May 10 00:45:57.705847 systemd-logind[1176]: New session 17 of user core. May 10 00:45:57.717000 audit[4755]: USER_START pid=4755 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:57.720000 audit[4758]: CRED_ACQ pid=4758 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:58.135365 sshd[4755]: pam_unix(sshd:session): session closed for user core May 10 00:45:58.138000 audit[4755]: USER_END pid=4755 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:58.138000 audit[4755]: CRED_DISP pid=4755 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:58.151946 systemd[1]: Started sshd@17-143.198.48.176:22-139.178.68.195:56310.service. May 10 00:45:58.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-143.198.48.176:22-139.178.68.195:56310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:58.155302 systemd[1]: sshd@16-143.198.48.176:22-139.178.68.195:56296.service: Deactivated successfully. May 10 00:45:58.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-143.198.48.176:22-139.178.68.195:56296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:58.162982 systemd[1]: session-17.scope: Deactivated successfully. May 10 00:45:58.164888 systemd-logind[1176]: Session 17 logged out. Waiting for processes to exit. May 10 00:45:58.169452 systemd-logind[1176]: Removed session 17. May 10 00:45:58.226000 audit[4766]: USER_ACCT pid=4766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:58.227966 sshd[4766]: Accepted publickey for core from 139.178.68.195 port 56310 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:45:58.229000 audit[4766]: CRED_ACQ pid=4766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:58.229000 audit[4766]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee7d6c770 a2=3 a3=0 items=0 ppid=1 pid=4766 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:58.229000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:45:58.231684 sshd[4766]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:58.241003 systemd-logind[1176]: New session 18 of user core. May 10 00:45:58.241567 systemd[1]: Started session-18.scope. May 10 00:45:58.252000 audit[4766]: USER_START pid=4766 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:45:58.255000 audit[4770]: CRED_ACQ pid=4770 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:02.044145 sshd[4766]: pam_unix(sshd:session): session closed for user core May 10 00:46:02.045000 audit[4766]: USER_END pid=4766 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:02.045000 audit[4766]: CRED_DISP pid=4766 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:02.056077 systemd[1]: Started sshd@18-143.198.48.176:22-139.178.68.195:56322.service. May 10 00:46:02.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-143.198.48.176:22-139.178.68.195:56322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:02.062246 systemd[1]: sshd@17-143.198.48.176:22-139.178.68.195:56310.service: Deactivated successfully. May 10 00:46:02.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-143.198.48.176:22-139.178.68.195:56310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:02.068082 systemd[1]: session-18.scope: Deactivated successfully. May 10 00:46:02.069916 systemd[1]: session-18.scope: Consumed 1.027s CPU time. May 10 00:46:02.071700 systemd-logind[1176]: Session 18 logged out. Waiting for processes to exit. May 10 00:46:02.075414 systemd-logind[1176]: Removed session 18. May 10 00:46:02.076000 audit[4799]: NETFILTER_CFG table=filter:117 family=2 entries=20 op=nft_register_rule pid=4799 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:02.076000 audit[4799]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe84d730b0 a2=0 a3=7ffe84d7309c items=0 ppid=2170 pid=4799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:02.076000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:02.098000 audit[4799]: NETFILTER_CFG table=nat:118 family=2 entries=22 op=nft_register_rule pid=4799 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:02.098000 audit[4799]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe84d730b0 a2=0 a3=0 items=0 ppid=2170 pid=4799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:02.098000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:02.137000 audit[4805]: NETFILTER_CFG table=filter:119 family=2 entries=32 op=nft_register_rule pid=4805 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:02.137000 audit[4805]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdb42b53f0 a2=0 a3=7ffdb42b53dc items=0 ppid=2170 pid=4805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:02.137000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:02.144000 audit[4805]: NETFILTER_CFG table=nat:120 family=2 entries=22 op=nft_register_rule pid=4805 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:02.144000 audit[4805]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdb42b53f0 a2=0 a3=0 items=0 ppid=2170 pid=4805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:02.144000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:02.162920 sshd[4801]: Accepted publickey for core from 139.178.68.195 port 56322 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:46:02.161000 audit[4801]: USER_ACCT pid=4801 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:02.164000 audit[4801]: CRED_ACQ pid=4801 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:02.164000 audit[4801]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdee7476f0 a2=3 a3=0 items=0 ppid=1 pid=4801 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:02.164000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:02.167532 sshd[4801]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:02.178940 systemd-logind[1176]: New session 19 of user core. May 10 00:46:02.180616 systemd[1]: Started session-19.scope. May 10 00:46:02.186000 audit[4801]: USER_START pid=4801 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:02.190000 audit[4806]: CRED_ACQ pid=4806 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:03.095071 sshd[4801]: pam_unix(sshd:session): session closed for user core May 10 00:46:03.107429 kernel: kauditd_printk_skb: 43 callbacks suppressed May 10 00:46:03.107850 kernel: audit: type=1106 audit(1746837963.102:1403): pid=4801 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:03.102000 audit[4801]: USER_END pid=4801 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:03.110257 systemd[1]: Started sshd@19-143.198.48.176:22-139.178.68.195:56328.service. May 10 00:46:03.111916 kernel: audit: type=1104 audit(1746837963.102:1404): pid=4801 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:03.102000 audit[4801]: CRED_DISP pid=4801 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:03.112662 systemd[1]: sshd@18-143.198.48.176:22-139.178.68.195:56322.service: Deactivated successfully. May 10 00:46:03.113869 systemd[1]: session-19.scope: Deactivated successfully. May 10 00:46:03.117962 systemd-logind[1176]: Session 19 logged out. Waiting for processes to exit. May 10 00:46:03.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-143.198.48.176:22-139.178.68.195:56328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:03.123665 kernel: audit: type=1130 audit(1746837963.110:1405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-143.198.48.176:22-139.178.68.195:56328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:03.123916 kernel: audit: type=1131 audit(1746837963.110:1406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-143.198.48.176:22-139.178.68.195:56322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:03.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-143.198.48.176:22-139.178.68.195:56322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:03.127514 systemd-logind[1176]: Removed session 19. May 10 00:46:03.175000 audit[4812]: USER_ACCT pid=4812 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:03.177910 sshd[4812]: Accepted publickey for core from 139.178.68.195 port 56328 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:46:03.180000 audit[4812]: CRED_ACQ pid=4812 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:03.187089 kernel: audit: type=1101 audit(1746837963.175:1407): pid=4812 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:03.187265 kernel: audit: type=1103 audit(1746837963.180:1408): pid=4812 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:03.187308 kernel: audit: type=1006 audit(1746837963.180:1409): pid=4812 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 May 10 00:46:03.180000 audit[4812]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6acc73b0 a2=3 a3=0 items=0 ppid=1 pid=4812 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:03.189658 sshd[4812]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:03.193190 kernel: audit: type=1300 audit(1746837963.180:1409): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6acc73b0 a2=3 a3=0 items=0 ppid=1 pid=4812 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:03.180000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:03.195893 kernel: audit: type=1327 audit(1746837963.180:1409): proctitle=737368643A20636F7265205B707269765D May 10 00:46:03.202577 systemd[1]: Started session-20.scope. May 10 00:46:03.203614 systemd-logind[1176]: New session 20 of user core. May 10 00:46:03.211000 audit[4812]: USER_START pid=4812 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:03.217839 kernel: audit: type=1105 audit(1746837963.211:1410): pid=4812 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:03.218000 audit[4815]: CRED_ACQ pid=4815 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:03.404091 sshd[4812]: pam_unix(sshd:session): session closed for user core May 10 00:46:03.404000 audit[4812]: USER_END pid=4812 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:03.406000 audit[4812]: CRED_DISP pid=4812 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:03.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-143.198.48.176:22-139.178.68.195:56328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:03.410821 systemd[1]: sshd@19-143.198.48.176:22-139.178.68.195:56328.service: Deactivated successfully. May 10 00:46:03.411917 systemd-logind[1176]: Session 20 logged out. Waiting for processes to exit. May 10 00:46:03.412098 systemd[1]: session-20.scope: Deactivated successfully. May 10 00:46:03.415035 systemd-logind[1176]: Removed session 20. May 10 00:46:07.372000 audit[4825]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=4825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:07.372000 audit[4825]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe452a0450 a2=0 a3=7ffe452a043c items=0 ppid=2170 pid=4825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:07.372000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:07.388000 audit[4825]: NETFILTER_CFG table=nat:122 family=2 entries=106 op=nft_register_chain pid=4825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:07.388000 audit[4825]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe452a0450 a2=0 a3=7ffe452a043c items=0 ppid=2170 pid=4825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:07.388000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:08.413566 systemd[1]: Started sshd@20-143.198.48.176:22-139.178.68.195:59606.service. May 10 00:46:08.421277 kernel: kauditd_printk_skb: 10 callbacks suppressed May 10 00:46:08.421427 kernel: audit: type=1130 audit(1746837968.413:1417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-143.198.48.176:22-139.178.68.195:59606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:08.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-143.198.48.176:22-139.178.68.195:59606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:08.493000 audit[4834]: USER_ACCT pid=4834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:08.499455 sshd[4834]: Accepted publickey for core from 139.178.68.195 port 59606 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:46:08.505180 kernel: audit: type=1101 audit(1746837968.493:1418): pid=4834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:08.505296 kernel: audit: type=1103 audit(1746837968.498:1419): pid=4834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:08.498000 audit[4834]: CRED_ACQ pid=4834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:08.500504 sshd[4834]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:08.498000 audit[4834]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecd87dfc0 a2=3 a3=0 items=0 ppid=1 pid=4834 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:08.513739 kernel: audit: type=1006 audit(1746837968.498:1420): pid=4834 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 10 00:46:08.513929 kernel: audit: type=1300 audit(1746837968.498:1420): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecd87dfc0 a2=3 a3=0 items=0 ppid=1 pid=4834 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:08.498000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:08.515775 kernel: audit: type=1327 audit(1746837968.498:1420): proctitle=737368643A20636F7265205B707269765D May 10 00:46:08.521637 systemd-logind[1176]: New session 21 of user core. May 10 00:46:08.522487 systemd[1]: Started session-21.scope. May 10 00:46:08.529000 audit[4834]: USER_START pid=4834 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:08.534863 kernel: audit: type=1105 audit(1746837968.529:1421): pid=4834 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:08.535000 audit[4836]: CRED_ACQ pid=4836 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:08.541863 kernel: audit: type=1103 audit(1746837968.535:1422): pid=4836 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:08.767130 sshd[4834]: pam_unix(sshd:session): session closed for user core May 10 00:46:08.769000 audit[4834]: USER_END pid=4834 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:08.777047 kernel: audit: type=1106 audit(1746837968.769:1423): pid=4834 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:08.777139 kernel: audit: type=1104 audit(1746837968.771:1424): pid=4834 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:08.771000 audit[4834]: CRED_DISP pid=4834 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:08.777319 systemd[1]: sshd@20-143.198.48.176:22-139.178.68.195:59606.service: Deactivated successfully. May 10 00:46:08.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-143.198.48.176:22-139.178.68.195:59606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:08.778549 systemd[1]: session-21.scope: Deactivated successfully. May 10 00:46:08.779373 systemd-logind[1176]: Session 21 logged out. Waiting for processes to exit. May 10 00:46:08.780535 systemd-logind[1176]: Removed session 21. May 10 00:46:10.838746 kubelet[2019]: E0510 00:46:10.838647 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:46:13.773857 systemd[1]: Started sshd@21-143.198.48.176:22-139.178.68.195:59614.service. May 10 00:46:13.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-143.198.48.176:22-139.178.68.195:59614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:13.779779 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:46:13.780008 kernel: audit: type=1130 audit(1746837973.772:1426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-143.198.48.176:22-139.178.68.195:59614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:13.846000 audit[4885]: USER_ACCT pid=4885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:13.849195 sshd[4885]: Accepted publickey for core from 139.178.68.195 port 59614 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:46:13.853964 kernel: audit: type=1101 audit(1746837973.846:1427): pid=4885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:13.853000 audit[4885]: CRED_ACQ pid=4885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:13.862345 kernel: audit: type=1103 audit(1746837973.853:1428): pid=4885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:13.862555 kernel: audit: type=1006 audit(1746837973.854:1429): pid=4885 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 10 00:46:13.862613 kernel: audit: type=1300 audit(1746837973.854:1429): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeeea576f0 a2=3 a3=0 items=0 ppid=1 pid=4885 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.854000 audit[4885]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeeea576f0 a2=3 a3=0 items=0 ppid=1 pid=4885 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.863306 sshd[4885]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:13.854000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:13.867690 kernel: audit: type=1327 audit(1746837973.854:1429): proctitle=737368643A20636F7265205B707269765D May 10 00:46:13.873569 systemd[1]: Started session-22.scope. May 10 00:46:13.874783 systemd-logind[1176]: New session 22 of user core. May 10 00:46:13.881000 audit[4885]: USER_START pid=4885 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:13.887941 kernel: audit: type=1105 audit(1746837973.881:1430): pid=4885 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:13.889585 kernel: audit: type=1103 audit(1746837973.886:1431): pid=4887 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:13.886000 audit[4887]: CRED_ACQ pid=4887 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:14.073017 sshd[4885]: pam_unix(sshd:session): session closed for user core May 10 00:46:14.074000 audit[4885]: USER_END pid=4885 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:14.077000 audit[4885]: CRED_DISP pid=4885 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:14.082848 kernel: audit: type=1106 audit(1746837974.074:1432): pid=4885 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:14.083038 kernel: audit: type=1104 audit(1746837974.077:1433): pid=4885 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:14.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-143.198.48.176:22-139.178.68.195:59614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:14.084300 systemd[1]: sshd@21-143.198.48.176:22-139.178.68.195:59614.service: Deactivated successfully. May 10 00:46:14.086046 systemd[1]: session-22.scope: Deactivated successfully. May 10 00:46:14.086571 systemd-logind[1176]: Session 22 logged out. Waiting for processes to exit. May 10 00:46:14.088323 systemd-logind[1176]: Removed session 22. May 10 00:46:15.805749 kubelet[2019]: E0510 00:46:15.805608 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:46:15.806773 kubelet[2019]: E0510 00:46:15.806710 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:46:19.091862 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:46:19.092049 kernel: audit: type=1130 audit(1746837979.089:1435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-143.198.48.176:22-139.178.68.195:40498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:19.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-143.198.48.176:22-139.178.68.195:40498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:19.089923 systemd[1]: Started sshd@22-143.198.48.176:22-139.178.68.195:40498.service. May 10 00:46:19.154000 audit[4897]: USER_ACCT pid=4897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:19.155327 sshd[4897]: Accepted publickey for core from 139.178.68.195 port 40498 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:46:19.160303 kernel: audit: type=1101 audit(1746837979.154:1436): pid=4897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:19.162000 audit[4897]: CRED_ACQ pid=4897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:19.164331 sshd[4897]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:19.169312 kernel: audit: type=1103 audit(1746837979.162:1437): pid=4897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:19.170121 kernel: audit: type=1006 audit(1746837979.162:1438): pid=4897 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 10 00:46:19.170259 kernel: audit: type=1300 audit(1746837979.162:1438): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff56532ba0 a2=3 a3=0 items=0 ppid=1 pid=4897 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:19.162000 audit[4897]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff56532ba0 a2=3 a3=0 items=0 ppid=1 pid=4897 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:19.176431 systemd[1]: Started session-23.scope. May 10 00:46:19.178899 systemd-logind[1176]: New session 23 of user core. May 10 00:46:19.162000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:19.183911 kernel: audit: type=1327 audit(1746837979.162:1438): proctitle=737368643A20636F7265205B707269765D May 10 00:46:19.187000 audit[4897]: USER_START pid=4897 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:19.193971 kernel: audit: type=1105 audit(1746837979.187:1439): pid=4897 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:19.193000 audit[4899]: CRED_ACQ pid=4899 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:19.200155 kernel: audit: type=1103 audit(1746837979.193:1440): pid=4899 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:19.380911 sshd[4897]: pam_unix(sshd:session): session closed for user core May 10 00:46:19.382000 audit[4897]: USER_END pid=4897 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:19.387784 kernel: audit: type=1106 audit(1746837979.382:1441): pid=4897 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:19.388275 systemd[1]: sshd@22-143.198.48.176:22-139.178.68.195:40498.service: Deactivated successfully. May 10 00:46:19.389437 systemd[1]: session-23.scope: Deactivated successfully. May 10 00:46:19.382000 audit[4897]: CRED_DISP pid=4897 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:19.394773 kernel: audit: type=1104 audit(1746837979.382:1442): pid=4897 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:19.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-143.198.48.176:22-139.178.68.195:40498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:19.395678 systemd-logind[1176]: Session 23 logged out. Waiting for processes to exit. May 10 00:46:19.398567 systemd-logind[1176]: Removed session 23. May 10 00:46:24.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-143.198.48.176:22-139.178.68.195:40508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:24.398075 systemd[1]: Started sshd@23-143.198.48.176:22-139.178.68.195:40508.service. May 10 00:46:24.403166 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:46:24.403240 kernel: audit: type=1130 audit(1746837984.397:1444): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-143.198.48.176:22-139.178.68.195:40508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:24.499000 audit[4911]: USER_ACCT pid=4911 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:24.501589 sshd[4911]: Accepted publickey for core from 139.178.68.195 port 40508 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:46:24.505994 kernel: audit: type=1101 audit(1746837984.499:1445): pid=4911 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:24.507000 audit[4911]: CRED_ACQ pid=4911 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:24.509584 sshd[4911]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:24.513985 kernel: audit: type=1103 audit(1746837984.507:1446): pid=4911 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:24.514254 kernel: audit: type=1006 audit(1746837984.507:1447): pid=4911 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 10 00:46:24.507000 audit[4911]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5454de30 a2=3 a3=0 items=0 ppid=1 pid=4911 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:24.522110 kernel: audit: type=1300 audit(1746837984.507:1447): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5454de30 a2=3 a3=0 items=0 ppid=1 pid=4911 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:24.522239 kernel: audit: type=1327 audit(1746837984.507:1447): proctitle=737368643A20636F7265205B707269765D May 10 00:46:24.507000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:24.524664 systemd-logind[1176]: New session 24 of user core. May 10 00:46:24.524807 systemd[1]: Started session-24.scope. May 10 00:46:24.534000 audit[4911]: USER_START pid=4911 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:24.541966 kernel: audit: type=1105 audit(1746837984.534:1448): pid=4911 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:24.535000 audit[4913]: CRED_ACQ pid=4913 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:24.546781 kernel: audit: type=1103 audit(1746837984.535:1449): pid=4913 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:24.746052 sshd[4911]: pam_unix(sshd:session): session closed for user core May 10 00:46:24.754558 kernel: audit: type=1106 audit(1746837984.748:1450): pid=4911 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:24.748000 audit[4911]: USER_END pid=4911 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:24.751676 systemd[1]: sshd@23-143.198.48.176:22-139.178.68.195:40508.service: Deactivated successfully. May 10 00:46:24.752951 systemd[1]: session-24.scope: Deactivated successfully. May 10 00:46:24.748000 audit[4911]: CRED_DISP pid=4911 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:24.755788 systemd-logind[1176]: Session 24 logged out. Waiting for processes to exit. May 10 00:46:24.759765 kernel: audit: type=1104 audit(1746837984.748:1451): pid=4911 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:24.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-143.198.48.176:22-139.178.68.195:40508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:24.761925 systemd-logind[1176]: Removed session 24. May 10 00:46:29.761472 systemd[1]: Started sshd@24-143.198.48.176:22-139.178.68.195:35828.service. May 10 00:46:29.767801 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:46:29.768000 kernel: audit: type=1130 audit(1746837989.761:1453): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-143.198.48.176:22-139.178.68.195:35828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:29.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-143.198.48.176:22-139.178.68.195:35828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:29.824000 audit[4926]: USER_ACCT pid=4926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:29.837246 kernel: audit: type=1101 audit(1746837989.824:1454): pid=4926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:29.837486 kernel: audit: type=1103 audit(1746837989.829:1455): pid=4926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:29.829000 audit[4926]: CRED_ACQ pid=4926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:29.841169 kernel: audit: type=1006 audit(1746837989.829:1456): pid=4926 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 10 00:46:29.841294 sshd[4926]: Accepted publickey for core from 139.178.68.195 port 35828 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:46:29.832056 sshd[4926]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:29.829000 audit[4926]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc85c7b3e0 a2=3 a3=0 items=0 ppid=1 pid=4926 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:29.829000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:29.849119 kernel: audit: type=1300 audit(1746837989.829:1456): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc85c7b3e0 a2=3 a3=0 items=0 ppid=1 pid=4926 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:29.849462 kernel: audit: type=1327 audit(1746837989.829:1456): proctitle=737368643A20636F7265205B707269765D May 10 00:46:29.855821 systemd-logind[1176]: New session 25 of user core. May 10 00:46:29.856655 systemd[1]: Started session-25.scope. May 10 00:46:29.871000 audit[4926]: USER_START pid=4926 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:29.879004 kernel: audit: type=1105 audit(1746837989.871:1457): pid=4926 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:29.877000 audit[4928]: CRED_ACQ pid=4928 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:29.883891 kernel: audit: type=1103 audit(1746837989.877:1458): pid=4928 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:30.078856 sshd[4926]: pam_unix(sshd:session): session closed for user core May 10 00:46:30.083000 audit[4926]: USER_END pid=4926 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:30.092681 systemd[1]: sshd@24-143.198.48.176:22-139.178.68.195:35828.service: Deactivated successfully. May 10 00:46:30.093154 kernel: audit: type=1106 audit(1746837990.083:1459): pid=4926 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:30.083000 audit[4926]: CRED_DISP pid=4926 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:30.094411 systemd[1]: session-25.scope: Deactivated successfully. May 10 00:46:30.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-143.198.48.176:22-139.178.68.195:35828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:30.098979 kernel: audit: type=1104 audit(1746837990.083:1460): pid=4926 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:30.100242 systemd-logind[1176]: Session 25 logged out. Waiting for processes to exit. May 10 00:46:30.102231 systemd-logind[1176]: Removed session 25. May 10 00:46:30.443233 systemd[1]: run-containerd-runc-k8s.io-e9d9994f15584b0a9a6f75a4929296fce69c2fd4c0f3ba844087eb24b1a74e0e-runc.6xXUW7.mount: Deactivated successfully. May 10 00:46:32.304000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:32.304000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002e7ae80 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:46:32.304000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:32.307000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:32.307000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00231a120 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:46:32.307000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:33.613000 audit[1870]: AVC avc: denied { watch } for pid=1870 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:33.613000 audit[1870]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c009f9c690 a2=fc6 a3=0 items=0 ppid=1752 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 key=(null) May 10 00:46:33.613000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134332E3139382E34382E313736002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 00:46:33.628000 audit[1870]: AVC avc: denied { watch } for pid=1870 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:33.628000 audit[1870]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c009f9c6c0 a2=fc6 a3=0 items=0 ppid=1752 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 key=(null) May 10 00:46:33.628000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134332E3139382E34382E313736002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 00:46:33.629000 audit[1870]: AVC avc: denied { watch } for pid=1870 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:33.629000 audit[1870]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00a6aa2c0 a2=fc6 a3=0 items=0 ppid=1752 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 key=(null) May 10 00:46:33.629000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134332E3139382E34382E313736002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 00:46:33.629000 audit[1870]: AVC avc: denied { watch } for pid=1870 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:33.629000 audit[1870]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c009f9c750 a2=fc6 a3=0 items=0 ppid=1752 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 key=(null) May 10 00:46:33.629000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134332E3139382E34382E313736002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 00:46:33.675000 audit[1870]: AVC avc: denied { watch } for pid=1870 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:33.675000 audit[1870]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c013a41920 a2=fc6 a3=0 items=0 ppid=1752 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 key=(null) May 10 00:46:33.675000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134332E3139382E34382E313736002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 00:46:33.675000 audit[1870]: AVC avc: denied { watch } for pid=1870 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:33.675000 audit[1870]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00a3a0c80 a2=fc6 a3=0 items=0 ppid=1752 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c565,c626 key=(null) May 10 00:46:33.675000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134332E3139382E34382E313736002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 00:46:34.136000 audit[4156]: AVC avc: denied { watch } for pid=4156 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_45_11.2099697569/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c823 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c186,c823 tclass=file permissive=0 May 10 00:46:34.136000 audit[4156]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0018e6560 a2=fc6 a3=0 items=0 ppid=3815 pid=4156 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c823 key=(null) May 10 00:46:34.136000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:46:34.771000 audit[4197]: AVC avc: denied { watch } for pid=4197 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_45_11.1879250218/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c833 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c391,c833 tclass=file permissive=0 May 10 00:46:34.773084 kernel: kauditd_printk_skb: 28 callbacks suppressed May 10 00:46:34.773157 kernel: audit: type=1400 audit(1746837994.771:1471): avc: denied { watch } for pid=4197 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_45_11.1879250218/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c391,c833 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c391,c833 tclass=file permissive=0 May 10 00:46:34.771000 audit[4197]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d75d80 a2=fc6 a3=0 items=0 ppid=3899 pid=4197 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c833 key=(null) May 10 00:46:34.780813 kernel: audit: type=1300 audit(1746837994.771:1471): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d75d80 a2=fc6 a3=0 items=0 ppid=3899 pid=4197 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c391,c833 key=(null) May 10 00:46:34.780989 kernel: audit: type=1327 audit(1746837994.771:1471): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:46:34.771000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:46:34.805777 kubelet[2019]: E0510 00:46:34.805699 2019 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:46:35.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-143.198.48.176:22-139.178.68.195:45790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:35.088517 systemd[1]: Started sshd@25-143.198.48.176:22-139.178.68.195:45790.service. May 10 00:46:35.094758 kernel: audit: type=1130 audit(1746837995.088:1472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-143.198.48.176:22-139.178.68.195:45790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:35.153266 sshd[4960]: Accepted publickey for core from 139.178.68.195 port 45790 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:46:35.152000 audit[4960]: USER_ACCT pid=4960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:35.157864 kernel: audit: type=1101 audit(1746837995.152:1473): pid=4960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:35.158549 kernel: audit: type=1103 audit(1746837995.157:1474): pid=4960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:35.157000 audit[4960]: CRED_ACQ pid=4960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:35.157000 audit[4960]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb02eb110 a2=3 a3=0 items=0 ppid=1 pid=4960 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:35.165468 sshd[4960]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:35.168291 kernel: audit: type=1006 audit(1746837995.157:1475): pid=4960 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 10 00:46:35.168444 kernel: audit: type=1300 audit(1746837995.157:1475): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb02eb110 a2=3 a3=0 items=0 ppid=1 pid=4960 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:35.170616 kernel: audit: type=1327 audit(1746837995.157:1475): proctitle=737368643A20636F7265205B707269765D May 10 00:46:35.157000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:35.175419 systemd-logind[1176]: New session 26 of user core. May 10 00:46:35.175782 systemd[1]: Started session-26.scope. May 10 00:46:35.189222 kernel: audit: type=1105 audit(1746837995.183:1476): pid=4960 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:35.183000 audit[4960]: USER_START pid=4960 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:35.188000 audit[4962]: CRED_ACQ pid=4962 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:35.409510 sshd[4960]: pam_unix(sshd:session): session closed for user core May 10 00:46:35.410000 audit[4960]: USER_END pid=4960 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:35.410000 audit[4960]: CRED_DISP pid=4960 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:46:35.415383 systemd-logind[1176]: Session 26 logged out. Waiting for processes to exit. May 10 00:46:35.415751 systemd[1]: sshd@25-143.198.48.176:22-139.178.68.195:45790.service: Deactivated successfully. May 10 00:46:35.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-143.198.48.176:22-139.178.68.195:45790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:35.417256 systemd[1]: session-26.scope: Deactivated successfully. May 10 00:46:35.419365 systemd-logind[1176]: Removed session 26. May 10 00:46:38.372000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:38.372000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:38.372000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c003286fc0 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:46:38.372000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:38.372000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e7b080 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:46:38.372000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:38.378000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:38.378000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c003287160 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:46:38.378000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:38.412000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526912 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:38.412000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c003287180 a2=fc6 a3=0 items=0 ppid=1743 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c988 key=(null) May 10 00:46:38.412000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269