May 10 00:49:48.017987 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 00:49:48.018024 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:49:48.018042 kernel: BIOS-provided physical RAM map: May 10 00:49:48.018050 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 10 00:49:48.018056 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 10 00:49:48.018062 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 10 00:49:48.018070 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdafff] usable May 10 00:49:48.018076 kernel: BIOS-e820: [mem 0x000000007ffdb000-0x000000007fffffff] reserved May 10 00:49:48.018086 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 10 00:49:48.018092 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 10 00:49:48.018099 kernel: NX (Execute Disable) protection: active May 10 00:49:48.018105 kernel: SMBIOS 2.8 present. May 10 00:49:48.018111 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 May 10 00:49:48.018118 kernel: Hypervisor detected: KVM May 10 00:49:48.018126 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 10 00:49:48.018136 kernel: kvm-clock: cpu 0, msr 1a196001, primary cpu clock May 10 00:49:48.018143 kernel: kvm-clock: using sched offset of 3547289510 cycles May 10 00:49:48.018151 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 10 00:49:48.018161 kernel: tsc: Detected 2494.140 MHz processor May 10 00:49:48.018169 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 00:49:48.018176 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 00:49:48.018183 kernel: last_pfn = 0x7ffdb max_arch_pfn = 0x400000000 May 10 00:49:48.018190 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 00:49:48.018200 kernel: ACPI: Early table checksum verification disabled May 10 00:49:48.018207 kernel: ACPI: RSDP 0x00000000000F5950 000014 (v00 BOCHS ) May 10 00:49:48.018214 kernel: ACPI: RSDT 0x000000007FFE1986 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:49:48.018222 kernel: ACPI: FACP 0x000000007FFE176A 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:49:48.018229 kernel: ACPI: DSDT 0x000000007FFE0040 00172A (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:49:48.018236 kernel: ACPI: FACS 0x000000007FFE0000 000040 May 10 00:49:48.018243 kernel: ACPI: APIC 0x000000007FFE17DE 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:49:48.018250 kernel: ACPI: HPET 0x000000007FFE185E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:49:48.018257 kernel: ACPI: SRAT 0x000000007FFE1896 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:49:48.018267 kernel: ACPI: WAET 0x000000007FFE195E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:49:48.018274 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe176a-0x7ffe17dd] May 10 00:49:48.018281 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe1769] May 10 00:49:48.018288 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] May 10 00:49:48.018295 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17de-0x7ffe185d] May 10 00:49:48.018302 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe185e-0x7ffe1895] May 10 00:49:48.018309 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe1896-0x7ffe195d] May 10 00:49:48.018316 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe195e-0x7ffe1985] May 10 00:49:48.018330 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 10 00:49:48.018338 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 10 00:49:48.018345 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 10 00:49:48.018353 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] May 10 00:49:48.018361 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdafff] -> [mem 0x00000000-0x7ffdafff] May 10 00:49:48.018369 kernel: NODE_DATA(0) allocated [mem 0x7ffd5000-0x7ffdafff] May 10 00:49:48.018397 kernel: Zone ranges: May 10 00:49:48.018405 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 00:49:48.018413 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdafff] May 10 00:49:48.018420 kernel: Normal empty May 10 00:49:48.018428 kernel: Movable zone start for each node May 10 00:49:48.018436 kernel: Early memory node ranges May 10 00:49:48.018444 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 10 00:49:48.018451 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdafff] May 10 00:49:48.018459 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdafff] May 10 00:49:48.018470 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:49:48.018481 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 10 00:49:48.018489 kernel: On node 0, zone DMA32: 37 pages in unavailable ranges May 10 00:49:48.018497 kernel: ACPI: PM-Timer IO Port: 0x608 May 10 00:49:48.018505 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 10 00:49:48.018512 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 10 00:49:48.018520 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 10 00:49:48.018528 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 10 00:49:48.018536 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 10 00:49:48.018546 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 10 00:49:48.018556 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 10 00:49:48.018564 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 00:49:48.018572 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 10 00:49:48.018580 kernel: TSC deadline timer available May 10 00:49:48.018588 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 10 00:49:48.018596 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices May 10 00:49:48.018604 kernel: Booting paravirtualized kernel on KVM May 10 00:49:48.018612 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 00:49:48.018620 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 10 00:49:48.018631 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 10 00:49:48.018639 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 10 00:49:48.018647 kernel: pcpu-alloc: [0] 0 1 May 10 00:49:48.018654 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 May 10 00:49:48.018662 kernel: kvm-guest: PV spinlocks disabled, no host support May 10 00:49:48.018670 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515803 May 10 00:49:48.018678 kernel: Policy zone: DMA32 May 10 00:49:48.018686 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:49:48.018697 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 00:49:48.018705 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 10 00:49:48.018712 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 10 00:49:48.018720 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 00:49:48.018729 kernel: Memory: 1973276K/2096612K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 123076K reserved, 0K cma-reserved) May 10 00:49:48.018736 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 10 00:49:48.018744 kernel: Kernel/User page tables isolation: enabled May 10 00:49:48.018752 kernel: ftrace: allocating 34584 entries in 136 pages May 10 00:49:48.018762 kernel: ftrace: allocated 136 pages with 2 groups May 10 00:49:48.018770 kernel: rcu: Hierarchical RCU implementation. May 10 00:49:48.018783 kernel: rcu: RCU event tracing is enabled. May 10 00:49:48.018796 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 10 00:49:48.018807 kernel: Rude variant of Tasks RCU enabled. May 10 00:49:48.018817 kernel: Tracing variant of Tasks RCU enabled. May 10 00:49:48.018829 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 00:49:48.018840 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 10 00:49:48.018851 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 10 00:49:48.018965 kernel: random: crng init done May 10 00:49:48.018977 kernel: Console: colour VGA+ 80x25 May 10 00:49:48.018987 kernel: printk: console [tty0] enabled May 10 00:49:48.018998 kernel: printk: console [ttyS0] enabled May 10 00:49:48.019009 kernel: ACPI: Core revision 20210730 May 10 00:49:48.019020 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 10 00:49:48.019032 kernel: APIC: Switch to symmetric I/O mode setup May 10 00:49:48.019042 kernel: x2apic enabled May 10 00:49:48.019050 kernel: Switched APIC routing to physical x2apic. May 10 00:49:48.019059 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 10 00:49:48.019072 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x23f39a1d859, max_idle_ns: 440795326830 ns May 10 00:49:48.019080 kernel: Calibrating delay loop (skipped) preset value.. 4988.28 BogoMIPS (lpj=2494140) May 10 00:49:48.019093 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 May 10 00:49:48.019101 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 May 10 00:49:48.019109 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 00:49:48.019117 kernel: Spectre V2 : Mitigation: Retpolines May 10 00:49:48.019125 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 10 00:49:48.019133 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls May 10 00:49:48.019144 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 10 00:49:48.019161 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 10 00:49:48.019169 kernel: MDS: Mitigation: Clear CPU buffers May 10 00:49:48.019180 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 10 00:49:48.019188 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 10 00:49:48.019196 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 10 00:49:48.019205 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 10 00:49:48.019213 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 10 00:49:48.019222 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 10 00:49:48.019231 kernel: Freeing SMP alternatives memory: 32K May 10 00:49:48.019242 kernel: pid_max: default: 32768 minimum: 301 May 10 00:49:48.019250 kernel: LSM: Security Framework initializing May 10 00:49:48.019258 kernel: SELinux: Initializing. May 10 00:49:48.019267 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 10 00:49:48.019275 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 10 00:49:48.019284 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x4f, stepping: 0x1) May 10 00:49:48.019292 kernel: Performance Events: unsupported p6 CPU model 79 no PMU driver, software events only. May 10 00:49:48.019304 kernel: signal: max sigframe size: 1776 May 10 00:49:48.019312 kernel: rcu: Hierarchical SRCU implementation. May 10 00:49:48.019321 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 10 00:49:48.019329 kernel: smp: Bringing up secondary CPUs ... May 10 00:49:48.019337 kernel: x86: Booting SMP configuration: May 10 00:49:48.019346 kernel: .... node #0, CPUs: #1 May 10 00:49:48.019354 kernel: kvm-clock: cpu 1, msr 1a196041, secondary cpu clock May 10 00:49:48.019363 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 May 10 00:49:48.019371 kernel: smp: Brought up 1 node, 2 CPUs May 10 00:49:48.019383 kernel: smpboot: Max logical packages: 1 May 10 00:49:48.019391 kernel: smpboot: Total of 2 processors activated (9976.56 BogoMIPS) May 10 00:49:48.019400 kernel: devtmpfs: initialized May 10 00:49:48.019408 kernel: x86/mm: Memory block size: 128MB May 10 00:49:48.019417 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 00:49:48.019425 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 10 00:49:48.019433 kernel: pinctrl core: initialized pinctrl subsystem May 10 00:49:48.019444 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 00:49:48.019458 kernel: audit: initializing netlink subsys (disabled) May 10 00:49:48.019475 kernel: audit: type=2000 audit(1746838187.282:1): state=initialized audit_enabled=0 res=1 May 10 00:49:48.019486 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 00:49:48.019497 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 00:49:48.019509 kernel: cpuidle: using governor menu May 10 00:49:48.019520 kernel: ACPI: bus type PCI registered May 10 00:49:48.019532 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 00:49:48.019548 kernel: dca service started, version 1.12.1 May 10 00:49:48.019561 kernel: PCI: Using configuration type 1 for base access May 10 00:49:48.019573 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 00:49:48.019585 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 00:49:48.019594 kernel: ACPI: Added _OSI(Module Device) May 10 00:49:48.019604 kernel: ACPI: Added _OSI(Processor Device) May 10 00:49:48.019619 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 00:49:48.019633 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 00:49:48.019644 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 00:49:48.019656 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 00:49:48.019668 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 00:49:48.019681 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 10 00:49:48.019698 kernel: ACPI: Interpreter enabled May 10 00:49:48.019709 kernel: ACPI: PM: (supports S0 S5) May 10 00:49:48.019720 kernel: ACPI: Using IOAPIC for interrupt routing May 10 00:49:48.019732 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 00:49:48.019743 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 10 00:49:48.019756 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 10 00:49:48.020104 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 10 00:49:48.020217 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 10 00:49:48.020237 kernel: acpiphp: Slot [3] registered May 10 00:49:48.020245 kernel: acpiphp: Slot [4] registered May 10 00:49:48.020254 kernel: acpiphp: Slot [5] registered May 10 00:49:48.020262 kernel: acpiphp: Slot [6] registered May 10 00:49:48.020271 kernel: acpiphp: Slot [7] registered May 10 00:49:48.020279 kernel: acpiphp: Slot [8] registered May 10 00:49:48.020287 kernel: acpiphp: Slot [9] registered May 10 00:49:48.020296 kernel: acpiphp: Slot [10] registered May 10 00:49:48.020304 kernel: acpiphp: Slot [11] registered May 10 00:49:48.020316 kernel: acpiphp: Slot [12] registered May 10 00:49:48.020324 kernel: acpiphp: Slot [13] registered May 10 00:49:48.020332 kernel: acpiphp: Slot [14] registered May 10 00:49:48.020341 kernel: acpiphp: Slot [15] registered May 10 00:49:48.020350 kernel: acpiphp: Slot [16] registered May 10 00:49:48.020358 kernel: acpiphp: Slot [17] registered May 10 00:49:48.020366 kernel: acpiphp: Slot [18] registered May 10 00:49:48.020375 kernel: acpiphp: Slot [19] registered May 10 00:49:48.020383 kernel: acpiphp: Slot [20] registered May 10 00:49:48.020394 kernel: acpiphp: Slot [21] registered May 10 00:49:48.020403 kernel: acpiphp: Slot [22] registered May 10 00:49:48.020411 kernel: acpiphp: Slot [23] registered May 10 00:49:48.020419 kernel: acpiphp: Slot [24] registered May 10 00:49:48.020443 kernel: acpiphp: Slot [25] registered May 10 00:49:48.020451 kernel: acpiphp: Slot [26] registered May 10 00:49:48.020460 kernel: acpiphp: Slot [27] registered May 10 00:49:48.020468 kernel: acpiphp: Slot [28] registered May 10 00:49:48.020476 kernel: acpiphp: Slot [29] registered May 10 00:49:48.020485 kernel: acpiphp: Slot [30] registered May 10 00:49:48.020496 kernel: acpiphp: Slot [31] registered May 10 00:49:48.020504 kernel: PCI host bridge to bus 0000:00 May 10 00:49:48.020613 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 10 00:49:48.020697 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 10 00:49:48.020775 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 10 00:49:48.020853 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] May 10 00:49:48.020944 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] May 10 00:49:48.021029 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 10 00:49:48.021142 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 10 00:49:48.021310 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 10 00:49:48.021428 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 May 10 00:49:48.021517 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc1e0-0xc1ef] May 10 00:49:48.021605 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 10 00:49:48.021699 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 10 00:49:48.021785 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 10 00:49:48.021881 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 10 00:49:48.021983 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 May 10 00:49:48.022071 kernel: pci 0000:00:01.2: reg 0x20: [io 0xc180-0xc19f] May 10 00:49:48.022181 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 10 00:49:48.022270 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI May 10 00:49:48.022476 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB May 10 00:49:48.022606 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 May 10 00:49:48.022695 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] May 10 00:49:48.022802 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] May 10 00:49:48.022907 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebf0000-0xfebf0fff] May 10 00:49:48.022997 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] May 10 00:49:48.023087 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 10 00:49:48.023197 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 May 10 00:49:48.023285 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc1a0-0xc1bf] May 10 00:49:48.023372 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebf1000-0xfebf1fff] May 10 00:49:48.023498 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] May 10 00:49:48.023608 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 10 00:49:48.023699 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc1c0-0xc1df] May 10 00:49:48.023792 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebf2000-0xfebf2fff] May 10 00:49:48.023898 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] May 10 00:49:48.023999 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 May 10 00:49:48.024087 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc100-0xc13f] May 10 00:49:48.024175 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebf3000-0xfebf3fff] May 10 00:49:48.024260 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] May 10 00:49:48.024361 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 May 10 00:49:48.024474 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc07f] May 10 00:49:48.024563 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfebf4000-0xfebf4fff] May 10 00:49:48.024649 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] May 10 00:49:48.024747 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 May 10 00:49:48.024835 kernel: pci 0000:00:07.0: reg 0x10: [io 0xc080-0xc0ff] May 10 00:49:48.024939 kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfebf5000-0xfebf5fff] May 10 00:49:48.025032 kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfe814000-0xfe817fff 64bit pref] May 10 00:49:48.025268 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 May 10 00:49:48.025387 kernel: pci 0000:00:08.0: reg 0x10: [io 0xc140-0xc17f] May 10 00:49:48.025491 kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfe818000-0xfe81bfff 64bit pref] May 10 00:49:48.025502 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 10 00:49:48.025511 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 10 00:49:48.025520 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 10 00:49:48.025529 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 10 00:49:48.025545 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 10 00:49:48.025554 kernel: iommu: Default domain type: Translated May 10 00:49:48.025563 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 00:49:48.025652 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device May 10 00:49:48.025738 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 10 00:49:48.025825 kernel: pci 0000:00:02.0: vgaarb: bridge control possible May 10 00:49:48.025836 kernel: vgaarb: loaded May 10 00:49:48.025845 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 00:49:48.025853 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 00:49:48.035952 kernel: PTP clock support registered May 10 00:49:48.035987 kernel: PCI: Using ACPI for IRQ routing May 10 00:49:48.036002 kernel: PCI: pci_cache_line_size set to 64 bytes May 10 00:49:48.036015 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 10 00:49:48.036028 kernel: e820: reserve RAM buffer [mem 0x7ffdb000-0x7fffffff] May 10 00:49:48.036041 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 10 00:49:48.036053 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 10 00:49:48.036067 kernel: clocksource: Switched to clocksource kvm-clock May 10 00:49:48.036081 kernel: VFS: Disk quotas dquot_6.6.0 May 10 00:49:48.036101 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 00:49:48.036110 kernel: pnp: PnP ACPI init May 10 00:49:48.036119 kernel: pnp: PnP ACPI: found 4 devices May 10 00:49:48.036128 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 00:49:48.036137 kernel: NET: Registered PF_INET protocol family May 10 00:49:48.036145 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 10 00:49:48.036154 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 10 00:49:48.036165 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 00:49:48.036182 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 10 00:49:48.036195 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 10 00:49:48.036209 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 10 00:49:48.036224 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 10 00:49:48.036235 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 10 00:49:48.036244 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 00:49:48.036253 kernel: NET: Registered PF_XDP protocol family May 10 00:49:48.036436 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 10 00:49:48.036528 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 10 00:49:48.036616 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 10 00:49:48.036697 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] May 10 00:49:48.036777 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] May 10 00:49:48.036897 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release May 10 00:49:48.037049 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 10 00:49:48.037184 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 10 00:49:48.037198 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 10 00:49:48.037320 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x740 took 31100 usecs May 10 00:49:48.037347 kernel: PCI: CLS 0 bytes, default 64 May 10 00:49:48.037361 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 10 00:49:48.037371 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x23f39a1d859, max_idle_ns: 440795326830 ns May 10 00:49:48.037380 kernel: Initialise system trusted keyrings May 10 00:49:48.037389 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 10 00:49:48.037403 kernel: Key type asymmetric registered May 10 00:49:48.037415 kernel: Asymmetric key parser 'x509' registered May 10 00:49:48.037429 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 00:49:48.037443 kernel: io scheduler mq-deadline registered May 10 00:49:48.037455 kernel: io scheduler kyber registered May 10 00:49:48.037463 kernel: io scheduler bfq registered May 10 00:49:48.037472 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 00:49:48.037481 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 May 10 00:49:48.037489 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 10 00:49:48.037498 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 10 00:49:48.037506 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 00:49:48.037515 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 00:49:48.037524 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 10 00:49:48.037534 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 10 00:49:48.037543 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 10 00:49:48.037700 kernel: rtc_cmos 00:03: RTC can wake from S4 May 10 00:49:48.037721 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 10 00:49:48.037818 kernel: rtc_cmos 00:03: registered as rtc0 May 10 00:49:48.037960 kernel: rtc_cmos 00:03: setting system clock to 2025-05-10T00:49:47 UTC (1746838187) May 10 00:49:48.038084 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram May 10 00:49:48.038101 kernel: intel_pstate: CPU model not supported May 10 00:49:48.038124 kernel: NET: Registered PF_INET6 protocol family May 10 00:49:48.038138 kernel: Segment Routing with IPv6 May 10 00:49:48.038152 kernel: In-situ OAM (IOAM) with IPv6 May 10 00:49:48.038167 kernel: NET: Registered PF_PACKET protocol family May 10 00:49:48.038182 kernel: Key type dns_resolver registered May 10 00:49:48.038196 kernel: IPI shorthand broadcast: enabled May 10 00:49:48.038210 kernel: sched_clock: Marking stable (613553700, 93917099)->(817761683, -110290884) May 10 00:49:48.038225 kernel: registered taskstats version 1 May 10 00:49:48.038240 kernel: Loading compiled-in X.509 certificates May 10 00:49:48.038259 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 00:49:48.038273 kernel: Key type .fscrypt registered May 10 00:49:48.038287 kernel: Key type fscrypt-provisioning registered May 10 00:49:48.038302 kernel: ima: No TPM chip found, activating TPM-bypass! May 10 00:49:48.038317 kernel: ima: Allocated hash algorithm: sha1 May 10 00:49:48.038331 kernel: ima: No architecture policies found May 10 00:49:48.038345 kernel: clk: Disabling unused clocks May 10 00:49:48.038360 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 00:49:48.038391 kernel: Write protecting the kernel read-only data: 28672k May 10 00:49:48.038404 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 00:49:48.038417 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 00:49:48.038431 kernel: Run /init as init process May 10 00:49:48.038445 kernel: with arguments: May 10 00:49:48.038460 kernel: /init May 10 00:49:48.038501 kernel: with environment: May 10 00:49:48.038518 kernel: HOME=/ May 10 00:49:48.038530 kernel: TERM=linux May 10 00:49:48.038544 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 00:49:48.038564 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:49:48.038576 systemd[1]: Detected virtualization kvm. May 10 00:49:48.038585 systemd[1]: Detected architecture x86-64. May 10 00:49:48.038594 systemd[1]: Running in initrd. May 10 00:49:48.038603 systemd[1]: No hostname configured, using default hostname. May 10 00:49:48.038612 systemd[1]: Hostname set to . May 10 00:49:48.038622 systemd[1]: Initializing machine ID from VM UUID. May 10 00:49:48.038633 systemd[1]: Queued start job for default target initrd.target. May 10 00:49:48.038642 systemd[1]: Started systemd-ask-password-console.path. May 10 00:49:48.038651 systemd[1]: Reached target cryptsetup.target. May 10 00:49:48.038660 systemd[1]: Reached target paths.target. May 10 00:49:48.038669 systemd[1]: Reached target slices.target. May 10 00:49:48.038678 systemd[1]: Reached target swap.target. May 10 00:49:48.038687 systemd[1]: Reached target timers.target. May 10 00:49:48.038699 systemd[1]: Listening on iscsid.socket. May 10 00:49:48.038708 systemd[1]: Listening on iscsiuio.socket. May 10 00:49:48.038718 systemd[1]: Listening on systemd-journald-audit.socket. May 10 00:49:48.038727 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 00:49:48.038736 systemd[1]: Listening on systemd-journald.socket. May 10 00:49:48.038746 systemd[1]: Listening on systemd-networkd.socket. May 10 00:49:48.038755 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:49:48.038765 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:49:48.038774 systemd[1]: Reached target sockets.target. May 10 00:49:48.038786 systemd[1]: Starting kmod-static-nodes.service... May 10 00:49:48.038795 systemd[1]: Finished network-cleanup.service. May 10 00:49:48.038807 systemd[1]: Starting systemd-fsck-usr.service... May 10 00:49:48.038816 systemd[1]: Starting systemd-journald.service... May 10 00:49:48.038825 systemd[1]: Starting systemd-modules-load.service... May 10 00:49:48.038834 systemd[1]: Starting systemd-resolved.service... May 10 00:49:48.038845 systemd[1]: Starting systemd-vconsole-setup.service... May 10 00:49:48.038854 systemd[1]: Finished kmod-static-nodes.service. May 10 00:49:48.038883 kernel: audit: type=1130 audit(1746838188.007:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.038896 systemd[1]: Finished systemd-fsck-usr.service. May 10 00:49:48.038914 systemd-journald[185]: Journal started May 10 00:49:48.039041 systemd-journald[185]: Runtime Journal (/run/log/journal/add3f394f4b74197a544bbeb95790a10) is 4.9M, max 39.5M, 34.5M free. May 10 00:49:48.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.033939 systemd-modules-load[186]: Inserted module 'overlay' May 10 00:49:48.070923 systemd[1]: Started systemd-journald.service. May 10 00:49:48.070962 kernel: audit: type=1130 audit(1746838188.066:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.048876 systemd-resolved[187]: Positive Trust Anchors: May 10 00:49:48.048891 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:49:48.048925 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:49:48.052231 systemd-resolved[187]: Defaulting to hostname 'linux'. May 10 00:49:48.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.076081 systemd[1]: Started systemd-resolved.service. May 10 00:49:48.083184 kernel: audit: type=1130 audit(1746838188.074:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.083213 kernel: audit: type=1130 audit(1746838188.079:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.080860 systemd[1]: Finished systemd-vconsole-setup.service. May 10 00:49:48.087701 kernel: audit: type=1130 audit(1746838188.082:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.083664 systemd[1]: Reached target nss-lookup.target. May 10 00:49:48.095671 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 00:49:48.087435 systemd[1]: Starting dracut-cmdline-ask.service... May 10 00:49:48.088835 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:49:48.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.101195 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:49:48.105087 kernel: audit: type=1130 audit(1746838188.100:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.106753 systemd-modules-load[186]: Inserted module 'br_netfilter' May 10 00:49:48.107271 kernel: Bridge firewalling registered May 10 00:49:48.112053 systemd[1]: Finished dracut-cmdline-ask.service. May 10 00:49:48.113484 systemd[1]: Starting dracut-cmdline.service... May 10 00:49:48.116773 kernel: audit: type=1130 audit(1746838188.111:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.128295 dracut-cmdline[200]: dracut-dracut-053 May 10 00:49:48.131909 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:49:48.140895 kernel: SCSI subsystem initialized May 10 00:49:48.155021 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 00:49:48.155104 kernel: device-mapper: uevent: version 1.0.3 May 10 00:49:48.155122 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 00:49:48.159111 systemd-modules-load[186]: Inserted module 'dm_multipath' May 10 00:49:48.159857 systemd[1]: Finished systemd-modules-load.service. May 10 00:49:48.161141 systemd[1]: Starting systemd-sysctl.service... May 10 00:49:48.164493 kernel: audit: type=1130 audit(1746838188.159:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.173750 systemd[1]: Finished systemd-sysctl.service. May 10 00:49:48.177069 kernel: audit: type=1130 audit(1746838188.173:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.222904 kernel: Loading iSCSI transport class v2.0-870. May 10 00:49:48.245909 kernel: iscsi: registered transport (tcp) May 10 00:49:48.274910 kernel: iscsi: registered transport (qla4xxx) May 10 00:49:48.275008 kernel: QLogic iSCSI HBA Driver May 10 00:49:48.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.325631 systemd[1]: Finished dracut-cmdline.service. May 10 00:49:48.327521 systemd[1]: Starting dracut-pre-udev.service... May 10 00:49:48.391949 kernel: raid6: avx2x4 gen() 15773 MB/s May 10 00:49:48.409046 kernel: raid6: avx2x4 xor() 4905 MB/s May 10 00:49:48.425941 kernel: raid6: avx2x2 gen() 17047 MB/s May 10 00:49:48.442955 kernel: raid6: avx2x2 xor() 14214 MB/s May 10 00:49:48.459954 kernel: raid6: avx2x1 gen() 15224 MB/s May 10 00:49:48.476964 kernel: raid6: avx2x1 xor() 11767 MB/s May 10 00:49:48.493955 kernel: raid6: sse2x4 gen() 9105 MB/s May 10 00:49:48.510964 kernel: raid6: sse2x4 xor() 4665 MB/s May 10 00:49:48.527952 kernel: raid6: sse2x2 gen() 9457 MB/s May 10 00:49:48.544940 kernel: raid6: sse2x2 xor() 6791 MB/s May 10 00:49:48.561954 kernel: raid6: sse2x1 gen() 8028 MB/s May 10 00:49:48.579676 kernel: raid6: sse2x1 xor() 5320 MB/s May 10 00:49:48.579778 kernel: raid6: using algorithm avx2x2 gen() 17047 MB/s May 10 00:49:48.579792 kernel: raid6: .... xor() 14214 MB/s, rmw enabled May 10 00:49:48.580411 kernel: raid6: using avx2x2 recovery algorithm May 10 00:49:48.597935 kernel: xor: automatically using best checksumming function avx May 10 00:49:48.718909 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 00:49:48.733986 systemd[1]: Finished dracut-pre-udev.service. May 10 00:49:48.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.734000 audit: BPF prog-id=7 op=LOAD May 10 00:49:48.734000 audit: BPF prog-id=8 op=LOAD May 10 00:49:48.736291 systemd[1]: Starting systemd-udevd.service... May 10 00:49:48.753223 systemd-udevd[384]: Using default interface naming scheme 'v252'. May 10 00:49:48.760050 systemd[1]: Started systemd-udevd.service. May 10 00:49:48.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.765698 systemd[1]: Starting dracut-pre-trigger.service... May 10 00:49:48.784092 dracut-pre-trigger[398]: rd.md=0: removing MD RAID activation May 10 00:49:48.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.830121 systemd[1]: Finished dracut-pre-trigger.service. May 10 00:49:48.831970 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:49:48.887138 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:49:48.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:48.949505 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) May 10 00:49:48.987548 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 10 00:49:48.987570 kernel: GPT:9289727 != 125829119 May 10 00:49:48.987591 kernel: GPT:Alternate GPT header not at the end of the disk. May 10 00:49:48.987602 kernel: GPT:9289727 != 125829119 May 10 00:49:48.987613 kernel: GPT: Use GNU Parted to correct GPT errors. May 10 00:49:48.987624 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:49:48.987637 kernel: scsi host0: Virtio SCSI HBA May 10 00:49:48.987814 kernel: cryptd: max_cpu_qlen set to 1000 May 10 00:49:48.993181 kernel: virtio_blk virtio5: [vdb] 980 512-byte logical blocks (502 kB/490 KiB) May 10 00:49:49.044512 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 00:49:49.049899 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (438) May 10 00:49:49.061917 kernel: AVX2 version of gcm_enc/dec engaged. May 10 00:49:49.063954 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 00:49:49.065694 kernel: AES CTR mode by8 optimization enabled May 10 00:49:49.072468 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 00:49:49.073189 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 00:49:49.080669 systemd[1]: Starting disk-uuid.service... May 10 00:49:49.088261 disk-uuid[458]: Primary Header is updated. May 10 00:49:49.088261 disk-uuid[458]: Secondary Entries is updated. May 10 00:49:49.088261 disk-uuid[458]: Secondary Header is updated. May 10 00:49:49.093904 kernel: libata version 3.00 loaded. May 10 00:49:49.096369 kernel: ACPI: bus type USB registered May 10 00:49:49.096441 kernel: usbcore: registered new interface driver usbfs May 10 00:49:49.103905 kernel: ata_piix 0000:00:01.1: version 2.13 May 10 00:49:49.126714 kernel: usbcore: registered new interface driver hub May 10 00:49:49.126748 kernel: usbcore: registered new device driver usb May 10 00:49:49.126761 kernel: scsi host1: ata_piix May 10 00:49:49.126960 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver May 10 00:49:49.126975 kernel: ehci-pci: EHCI PCI platform driver May 10 00:49:49.126992 kernel: scsi host2: ata_piix May 10 00:49:49.127209 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 May 10 00:49:49.127230 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 May 10 00:49:49.114487 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:49:49.299924 kernel: uhci_hcd: USB Universal Host Controller Interface driver May 10 00:49:49.316513 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller May 10 00:49:49.319931 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 May 10 00:49:49.320153 kernel: uhci_hcd 0000:00:01.2: detected 2 ports May 10 00:49:49.320297 kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c180 May 10 00:49:49.320407 kernel: hub 1-0:1.0: USB hub found May 10 00:49:49.320599 kernel: hub 1-0:1.0: 2 ports detected May 10 00:49:50.096908 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:49:50.097695 disk-uuid[461]: The operation has completed successfully. May 10 00:49:50.106927 kernel: block device autoloading is deprecated. It will be removed in Linux 5.19 May 10 00:49:50.169495 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 00:49:50.169700 systemd[1]: Finished disk-uuid.service. May 10 00:49:50.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.172204 systemd[1]: Starting verity-setup.service... May 10 00:49:50.193903 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 10 00:49:50.260380 systemd[1]: Found device dev-mapper-usr.device. May 10 00:49:50.263301 systemd[1]: Mounting sysusr-usr.mount... May 10 00:49:50.264784 systemd[1]: Finished verity-setup.service. May 10 00:49:50.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.357902 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 00:49:50.358257 systemd[1]: Mounted sysusr-usr.mount. May 10 00:49:50.358973 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 10 00:49:50.360059 systemd[1]: Starting ignition-setup.service... May 10 00:49:50.361506 systemd[1]: Starting parse-ip-for-networkd.service... May 10 00:49:50.385950 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:49:50.386050 kernel: BTRFS info (device vda6): using free space tree May 10 00:49:50.386065 kernel: BTRFS info (device vda6): has skinny extents May 10 00:49:50.410522 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 00:49:50.418231 systemd[1]: Finished ignition-setup.service. May 10 00:49:50.419737 systemd[1]: Starting ignition-fetch-offline.service... May 10 00:49:50.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.529093 systemd[1]: Finished parse-ip-for-networkd.service. May 10 00:49:50.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.530000 audit: BPF prog-id=9 op=LOAD May 10 00:49:50.532358 systemd[1]: Starting systemd-networkd.service... May 10 00:49:50.558841 systemd-networkd[689]: lo: Link UP May 10 00:49:50.558853 systemd-networkd[689]: lo: Gained carrier May 10 00:49:50.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.560065 systemd-networkd[689]: Enumeration completed May 10 00:49:50.560498 systemd[1]: Started systemd-networkd.service. May 10 00:49:50.560839 systemd-networkd[689]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:49:50.560976 systemd[1]: Reached target network.target. May 10 00:49:50.562748 systemd[1]: Starting iscsiuio.service... May 10 00:49:50.566038 systemd-networkd[689]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. May 10 00:49:50.567708 systemd-networkd[689]: eth1: Link UP May 10 00:49:50.567716 systemd-networkd[689]: eth1: Gained carrier May 10 00:49:50.571232 ignition[621]: Ignition 2.14.0 May 10 00:49:50.571245 ignition[621]: Stage: fetch-offline May 10 00:49:50.571322 ignition[621]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:49:50.573333 systemd-networkd[689]: eth0: Link UP May 10 00:49:50.571367 ignition[621]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 10 00:49:50.573338 systemd-networkd[689]: eth0: Gained carrier May 10 00:49:50.581290 ignition[621]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 10 00:49:50.582182 ignition[621]: parsed url from cmdline: "" May 10 00:49:50.582286 ignition[621]: no config URL provided May 10 00:49:50.582792 ignition[621]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:49:50.583404 ignition[621]: no config at "/usr/lib/ignition/user.ign" May 10 00:49:50.585941 ignition[621]: failed to fetch config: resource requires networking May 10 00:49:50.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.590111 systemd[1]: Started iscsiuio.service. May 10 00:49:50.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.586160 ignition[621]: Ignition finished successfully May 10 00:49:50.592352 systemd[1]: Finished ignition-fetch-offline.service. May 10 00:49:50.593897 systemd[1]: Starting ignition-fetch.service... May 10 00:49:50.595012 systemd-networkd[689]: eth1: DHCPv4 address 10.124.0.29/20 acquired from 169.254.169.253 May 10 00:49:50.599569 systemd[1]: Starting iscsid.service... May 10 00:49:50.601033 systemd-networkd[689]: eth0: DHCPv4 address 146.190.154.235/20, gateway 146.190.144.1 acquired from 169.254.169.253 May 10 00:49:50.610572 iscsid[699]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 00:49:50.610572 iscsid[699]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 00:49:50.610572 iscsid[699]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 00:49:50.610572 iscsid[699]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 00:49:50.610572 iscsid[699]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 00:49:50.610572 iscsid[699]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 00:49:50.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.612936 systemd[1]: Started iscsid.service. May 10 00:49:50.613542 ignition[695]: Ignition 2.14.0 May 10 00:49:50.616358 systemd[1]: Starting dracut-initqueue.service... May 10 00:49:50.613550 ignition[695]: Stage: fetch May 10 00:49:50.613696 ignition[695]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:49:50.613724 ignition[695]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 10 00:49:50.618041 ignition[695]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 10 00:49:50.620996 ignition[695]: parsed url from cmdline: "" May 10 00:49:50.621003 ignition[695]: no config URL provided May 10 00:49:50.621013 ignition[695]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:49:50.621028 ignition[695]: no config at "/usr/lib/ignition/user.ign" May 10 00:49:50.621069 ignition[695]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 May 10 00:49:50.638190 systemd[1]: Finished dracut-initqueue.service. May 10 00:49:50.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.638884 systemd[1]: Reached target remote-fs-pre.target. May 10 00:49:50.639434 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:49:50.640050 systemd[1]: Reached target remote-fs.target. May 10 00:49:50.641627 systemd[1]: Starting dracut-pre-mount.service... May 10 00:49:50.648554 ignition[695]: GET result: OK May 10 00:49:50.648717 ignition[695]: parsing config with SHA512: 6508269f75865d61f31041079a24079b78700c4ff9b3ea5704c7a86b257660519ab98396cb3d51e828a95a9c0a70b3bbbaa35e4c19a6a1b17e15deff125cd30e May 10 00:49:50.655289 systemd[1]: Finished dracut-pre-mount.service. May 10 00:49:50.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.658954 unknown[695]: fetched base config from "system" May 10 00:49:50.658971 unknown[695]: fetched base config from "system" May 10 00:49:50.659469 ignition[695]: fetch: fetch complete May 10 00:49:50.658979 unknown[695]: fetched user config from "digitalocean" May 10 00:49:50.659476 ignition[695]: fetch: fetch passed May 10 00:49:50.662262 systemd[1]: Finished ignition-fetch.service. May 10 00:49:50.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.659528 ignition[695]: Ignition finished successfully May 10 00:49:50.664666 systemd[1]: Starting ignition-kargs.service... May 10 00:49:50.678069 ignition[715]: Ignition 2.14.0 May 10 00:49:50.678081 ignition[715]: Stage: kargs May 10 00:49:50.678238 ignition[715]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:49:50.678259 ignition[715]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 10 00:49:50.681088 ignition[715]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 10 00:49:50.682756 ignition[715]: kargs: kargs passed May 10 00:49:50.682846 ignition[715]: Ignition finished successfully May 10 00:49:50.684327 systemd[1]: Finished ignition-kargs.service. May 10 00:49:50.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.686583 systemd[1]: Starting ignition-disks.service... May 10 00:49:50.701270 ignition[721]: Ignition 2.14.0 May 10 00:49:50.701281 ignition[721]: Stage: disks May 10 00:49:50.701452 ignition[721]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:49:50.701479 ignition[721]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 10 00:49:50.703668 ignition[721]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 10 00:49:50.706799 ignition[721]: disks: disks passed May 10 00:49:50.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.709216 systemd[1]: Finished ignition-disks.service. May 10 00:49:50.707965 ignition[721]: Ignition finished successfully May 10 00:49:50.710087 systemd[1]: Reached target initrd-root-device.target. May 10 00:49:50.710447 systemd[1]: Reached target local-fs-pre.target. May 10 00:49:50.710828 systemd[1]: Reached target local-fs.target. May 10 00:49:50.711191 systemd[1]: Reached target sysinit.target. May 10 00:49:50.711492 systemd[1]: Reached target basic.target. May 10 00:49:50.713242 systemd[1]: Starting systemd-fsck-root.service... May 10 00:49:50.735329 systemd-fsck[729]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 10 00:49:50.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.740148 systemd[1]: Finished systemd-fsck-root.service. May 10 00:49:50.741660 systemd[1]: Mounting sysroot.mount... May 10 00:49:50.753919 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 00:49:50.755128 systemd[1]: Mounted sysroot.mount. May 10 00:49:50.756153 systemd[1]: Reached target initrd-root-fs.target. May 10 00:49:50.758462 systemd[1]: Mounting sysroot-usr.mount... May 10 00:49:50.760403 systemd[1]: Starting flatcar-digitalocean-network.service... May 10 00:49:50.762932 systemd[1]: Starting flatcar-metadata-hostname.service... May 10 00:49:50.763856 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 00:49:50.765390 systemd[1]: Reached target ignition-diskful.target. May 10 00:49:50.767694 systemd[1]: Mounted sysroot-usr.mount. May 10 00:49:50.770209 systemd[1]: Starting initrd-setup-root.service... May 10 00:49:50.778129 initrd-setup-root[741]: cut: /sysroot/etc/passwd: No such file or directory May 10 00:49:50.798569 initrd-setup-root[749]: cut: /sysroot/etc/group: No such file or directory May 10 00:49:50.807575 initrd-setup-root[759]: cut: /sysroot/etc/shadow: No such file or directory May 10 00:49:50.821654 initrd-setup-root[769]: cut: /sysroot/etc/gshadow: No such file or directory May 10 00:49:50.902267 coreos-metadata[735]: May 10 00:49:50.901 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 10 00:49:50.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.904218 systemd[1]: Finished initrd-setup-root.service. May 10 00:49:50.906656 systemd[1]: Starting ignition-mount.service... May 10 00:49:50.910235 systemd[1]: Starting sysroot-boot.service... May 10 00:49:50.926084 coreos-metadata[735]: May 10 00:49:50.925 INFO Fetch successful May 10 00:49:50.929354 bash[787]: umount: /sysroot/usr/share/oem: not mounted. May 10 00:49:50.937904 coreos-metadata[736]: May 10 00:49:50.936 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 10 00:49:50.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.940834 systemd[1]: flatcar-digitalocean-network.service: Deactivated successfully. May 10 00:49:50.940988 systemd[1]: Finished flatcar-digitalocean-network.service. May 10 00:49:50.947705 systemd[1]: Finished sysroot-boot.service. May 10 00:49:50.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.948959 coreos-metadata[736]: May 10 00:49:50.948 INFO Fetch successful May 10 00:49:50.953215 coreos-metadata[736]: May 10 00:49:50.953 INFO wrote hostname ci-3510.3.7-n-09020fac35 to /sysroot/etc/hostname May 10 00:49:50.955382 ignition[788]: INFO : Ignition 2.14.0 May 10 00:49:50.955382 ignition[788]: INFO : Stage: mount May 10 00:49:50.955382 ignition[788]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:49:50.955382 ignition[788]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 10 00:49:50.957575 ignition[788]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 10 00:49:50.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.958353 systemd[1]: Finished flatcar-metadata-hostname.service. May 10 00:49:50.959390 ignition[788]: INFO : mount: mount passed May 10 00:49:50.959390 ignition[788]: INFO : Ignition finished successfully May 10 00:49:50.960732 systemd[1]: Finished ignition-mount.service. May 10 00:49:50.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:51.283981 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:49:51.293923 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (797) May 10 00:49:51.303931 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:49:51.304015 kernel: BTRFS info (device vda6): using free space tree May 10 00:49:51.304029 kernel: BTRFS info (device vda6): has skinny extents May 10 00:49:51.310532 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:49:51.312604 systemd[1]: Starting ignition-files.service... May 10 00:49:51.335453 ignition[817]: INFO : Ignition 2.14.0 May 10 00:49:51.335453 ignition[817]: INFO : Stage: files May 10 00:49:51.336505 ignition[817]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:49:51.336505 ignition[817]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 10 00:49:51.337825 ignition[817]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 10 00:49:51.341944 ignition[817]: DEBUG : files: compiled without relabeling support, skipping May 10 00:49:51.341944 ignition[817]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 00:49:51.341944 ignition[817]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 00:49:51.346343 ignition[817]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 00:49:51.347446 ignition[817]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 00:49:51.349237 unknown[817]: wrote ssh authorized keys file for user: core May 10 00:49:51.352494 ignition[817]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 00:49:51.352494 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 10 00:49:51.352494 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 May 10 00:49:51.392124 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 10 00:49:51.683928 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 10 00:49:51.683928 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 10 00:49:51.685827 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 10 00:49:51.685827 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 10 00:49:51.689319 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 10 00:49:51.690524 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:49:51.692343 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:49:51.692343 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:49:51.692343 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:49:51.695020 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:49:51.695020 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:49:51.695020 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 10 00:49:51.695020 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 10 00:49:51.695020 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 10 00:49:51.695020 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-x86-64.raw: attempt #1 May 10 00:49:51.768049 systemd-networkd[689]: eth1: Gained IPv6LL May 10 00:49:52.044174 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 10 00:49:52.153118 systemd-networkd[689]: eth0: Gained IPv6LL May 10 00:49:52.348041 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 10 00:49:52.348041 ignition[817]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" May 10 00:49:52.348041 ignition[817]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" May 10 00:49:52.348041 ignition[817]: INFO : files: op(c): [started] processing unit "prepare-helm.service" May 10 00:49:52.351890 ignition[817]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:49:52.351890 ignition[817]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:49:52.351890 ignition[817]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" May 10 00:49:52.351890 ignition[817]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 00:49:52.351890 ignition[817]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 00:49:52.351890 ignition[817]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 10 00:49:52.351890 ignition[817]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 10 00:49:52.361026 ignition[817]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 00:49:52.362035 ignition[817]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 00:49:52.362035 ignition[817]: INFO : files: files passed May 10 00:49:52.362035 ignition[817]: INFO : Ignition finished successfully May 10 00:49:52.364525 systemd[1]: Finished ignition-files.service. May 10 00:49:52.370745 kernel: kauditd_printk_skb: 29 callbacks suppressed May 10 00:49:52.370777 kernel: audit: type=1130 audit(1746838192.364:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.366105 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 00:49:52.371825 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 00:49:52.372980 systemd[1]: Starting ignition-quench.service... May 10 00:49:52.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.378442 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 00:49:52.384546 kernel: audit: type=1130 audit(1746838192.378:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.384597 kernel: audit: type=1131 audit(1746838192.378:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.384667 initrd-setup-root-after-ignition[842]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 00:49:52.378595 systemd[1]: Finished ignition-quench.service. May 10 00:49:52.386732 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 00:49:52.391299 kernel: audit: type=1130 audit(1746838192.386:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.387558 systemd[1]: Reached target ignition-complete.target. May 10 00:49:52.393459 systemd[1]: Starting initrd-parse-etc.service... May 10 00:49:52.414750 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 00:49:52.414906 systemd[1]: Finished initrd-parse-etc.service. May 10 00:49:52.421395 kernel: audit: type=1130 audit(1746838192.414:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.421435 kernel: audit: type=1131 audit(1746838192.414:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.415993 systemd[1]: Reached target initrd-fs.target. May 10 00:49:52.421767 systemd[1]: Reached target initrd.target. May 10 00:49:52.422720 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 00:49:52.424218 systemd[1]: Starting dracut-pre-pivot.service... May 10 00:49:52.438581 systemd[1]: Finished dracut-pre-pivot.service. May 10 00:49:52.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.440825 systemd[1]: Starting initrd-cleanup.service... May 10 00:49:52.443523 kernel: audit: type=1130 audit(1746838192.438:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.453145 systemd[1]: Stopped target nss-lookup.target. May 10 00:49:52.454084 systemd[1]: Stopped target remote-cryptsetup.target. May 10 00:49:52.454938 systemd[1]: Stopped target timers.target. May 10 00:49:52.455683 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 00:49:52.456218 systemd[1]: Stopped dracut-pre-pivot.service. May 10 00:49:52.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.458094 systemd[1]: Stopped target initrd.target. May 10 00:49:52.459900 kernel: audit: type=1131 audit(1746838192.456:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.459668 systemd[1]: Stopped target basic.target. May 10 00:49:52.460224 systemd[1]: Stopped target ignition-complete.target. May 10 00:49:52.467746 systemd[1]: Stopped target ignition-diskful.target. May 10 00:49:52.468223 systemd[1]: Stopped target initrd-root-device.target. May 10 00:49:52.468827 systemd[1]: Stopped target remote-fs.target. May 10 00:49:52.469553 systemd[1]: Stopped target remote-fs-pre.target. May 10 00:49:52.470090 systemd[1]: Stopped target sysinit.target. May 10 00:49:52.470685 systemd[1]: Stopped target local-fs.target. May 10 00:49:52.471264 systemd[1]: Stopped target local-fs-pre.target. May 10 00:49:52.471958 systemd[1]: Stopped target swap.target. May 10 00:49:52.472424 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 00:49:52.475917 kernel: audit: type=1131 audit(1746838192.472:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.472583 systemd[1]: Stopped dracut-pre-mount.service. May 10 00:49:52.473270 systemd[1]: Stopped target cryptsetup.target. May 10 00:49:52.477847 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 00:49:52.478916 systemd[1]: Stopped dracut-initqueue.service. May 10 00:49:52.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.480504 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 00:49:52.483522 kernel: audit: type=1131 audit(1746838192.479:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.480817 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 00:49:52.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.483982 systemd[1]: ignition-files.service: Deactivated successfully. May 10 00:49:52.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.484099 systemd[1]: Stopped ignition-files.service. May 10 00:49:52.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.484777 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. May 10 00:49:52.484889 systemd[1]: Stopped flatcar-metadata-hostname.service. May 10 00:49:52.486694 systemd[1]: Stopping ignition-mount.service... May 10 00:49:52.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.487068 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 00:49:52.487215 systemd[1]: Stopped kmod-static-nodes.service. May 10 00:49:52.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.489652 systemd[1]: Stopping sysroot-boot.service... May 10 00:49:52.490202 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 00:49:52.490439 systemd[1]: Stopped systemd-udev-trigger.service. May 10 00:49:52.491128 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 00:49:52.491282 systemd[1]: Stopped dracut-pre-trigger.service. May 10 00:49:52.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.512086 ignition[855]: INFO : Ignition 2.14.0 May 10 00:49:52.512086 ignition[855]: INFO : Stage: umount May 10 00:49:52.512086 ignition[855]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:49:52.512086 ignition[855]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 10 00:49:52.512086 ignition[855]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 10 00:49:52.512086 ignition[855]: INFO : umount: umount passed May 10 00:49:52.512086 ignition[855]: INFO : Ignition finished successfully May 10 00:49:52.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.505760 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 00:49:52.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.505888 systemd[1]: Finished initrd-cleanup.service. May 10 00:49:52.512850 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 00:49:52.512959 systemd[1]: Stopped ignition-mount.service. May 10 00:49:52.513732 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 00:49:52.513793 systemd[1]: Stopped ignition-disks.service. May 10 00:49:52.514710 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 00:49:52.514777 systemd[1]: Stopped ignition-kargs.service. May 10 00:49:52.515997 systemd[1]: ignition-fetch.service: Deactivated successfully. May 10 00:49:52.516046 systemd[1]: Stopped ignition-fetch.service. May 10 00:49:52.516808 systemd[1]: Stopped target network.target. May 10 00:49:52.517501 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 00:49:52.517550 systemd[1]: Stopped ignition-fetch-offline.service. May 10 00:49:52.519025 systemd[1]: Stopped target paths.target. May 10 00:49:52.520111 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 00:49:52.525433 systemd[1]: Stopped systemd-ask-password-console.path. May 10 00:49:52.526207 systemd[1]: Stopped target slices.target. May 10 00:49:52.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.527142 systemd[1]: Stopped target sockets.target. May 10 00:49:52.527934 systemd[1]: iscsid.socket: Deactivated successfully. May 10 00:49:52.527970 systemd[1]: Closed iscsid.socket. May 10 00:49:52.528609 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 00:49:52.528634 systemd[1]: Closed iscsiuio.socket. May 10 00:49:52.529475 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 00:49:52.529541 systemd[1]: Stopped ignition-setup.service. May 10 00:49:52.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.530755 systemd[1]: Stopping systemd-networkd.service... May 10 00:49:52.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.531242 systemd[1]: Stopping systemd-resolved.service... May 10 00:49:52.533537 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 10 00:49:52.534199 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 00:49:52.534295 systemd[1]: Stopped sysroot-boot.service. May 10 00:49:52.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.534933 systemd-networkd[689]: eth0: DHCPv6 lease lost May 10 00:49:52.535193 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 00:49:52.535243 systemd[1]: Stopped initrd-setup-root.service. May 10 00:49:52.537402 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 00:49:52.537532 systemd[1]: Stopped systemd-resolved.service. May 10 00:49:52.540000 audit: BPF prog-id=6 op=UNLOAD May 10 00:49:52.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.538990 systemd-networkd[689]: eth1: DHCPv6 lease lost May 10 00:49:52.540154 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:49:52.540272 systemd[1]: Stopped systemd-networkd.service. May 10 00:49:52.541568 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 00:49:52.541606 systemd[1]: Closed systemd-networkd.socket. May 10 00:49:52.543342 systemd[1]: Stopping network-cleanup.service... May 10 00:49:52.543000 audit: BPF prog-id=9 op=UNLOAD May 10 00:49:52.544181 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 00:49:52.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.544283 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 00:49:52.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.545005 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 00:49:52.545088 systemd[1]: Stopped systemd-sysctl.service. May 10 00:49:52.547261 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 00:49:52.547313 systemd[1]: Stopped systemd-modules-load.service. May 10 00:49:52.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.552220 systemd[1]: Stopping systemd-udevd.service... May 10 00:49:52.553819 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 10 00:49:52.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.557656 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 00:49:52.557777 systemd[1]: Stopped network-cleanup.service. May 10 00:49:52.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.559372 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 00:49:52.559534 systemd[1]: Stopped systemd-udevd.service. May 10 00:49:52.560506 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 00:49:52.560550 systemd[1]: Closed systemd-udevd-control.socket. May 10 00:49:52.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.561418 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 00:49:52.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.561468 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 00:49:52.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.562168 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 00:49:52.562233 systemd[1]: Stopped dracut-pre-udev.service. May 10 00:49:52.563181 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 00:49:52.563223 systemd[1]: Stopped dracut-cmdline.service. May 10 00:49:52.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.563844 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 00:49:52.563966 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 00:49:52.565381 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 00:49:52.565896 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 00:49:52.565957 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 00:49:52.575586 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 00:49:52.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:52.575712 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 00:49:52.576491 systemd[1]: Reached target initrd-switch-root.target. May 10 00:49:52.584632 systemd[1]: Starting initrd-switch-root.service... May 10 00:49:52.601291 systemd[1]: Switching root. May 10 00:49:52.625082 iscsid[699]: iscsid shutting down. May 10 00:49:52.625810 systemd-journald[185]: Journal stopped May 10 00:49:56.501545 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). May 10 00:49:56.501686 kernel: SELinux: Class mctp_socket not defined in policy. May 10 00:49:56.501711 kernel: SELinux: Class anon_inode not defined in policy. May 10 00:49:56.501737 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 00:49:56.501772 kernel: SELinux: policy capability network_peer_controls=1 May 10 00:49:56.501788 kernel: SELinux: policy capability open_perms=1 May 10 00:49:56.501804 kernel: SELinux: policy capability extended_socket_class=1 May 10 00:49:56.501823 kernel: SELinux: policy capability always_check_network=0 May 10 00:49:56.501845 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 00:49:56.501892 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 00:49:56.501908 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 00:49:56.501924 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 00:49:56.501947 systemd[1]: Successfully loaded SELinux policy in 53.144ms. May 10 00:49:56.501992 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.753ms. May 10 00:49:56.502015 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:49:56.502034 systemd[1]: Detected virtualization kvm. May 10 00:49:56.502050 systemd[1]: Detected architecture x86-64. May 10 00:49:56.502067 systemd[1]: Detected first boot. May 10 00:49:56.502084 systemd[1]: Hostname set to . May 10 00:49:56.502102 systemd[1]: Initializing machine ID from VM UUID. May 10 00:49:56.502124 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 00:49:56.502142 systemd[1]: Populated /etc with preset unit settings. May 10 00:49:56.502160 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:49:56.502179 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:49:56.502197 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:49:56.502217 systemd[1]: iscsiuio.service: Deactivated successfully. May 10 00:49:56.502235 systemd[1]: Stopped iscsiuio.service. May 10 00:49:56.502257 systemd[1]: iscsid.service: Deactivated successfully. May 10 00:49:56.502276 systemd[1]: Stopped iscsid.service. May 10 00:49:56.502300 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 10 00:49:56.502321 systemd[1]: Stopped initrd-switch-root.service. May 10 00:49:56.502339 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 10 00:49:56.502357 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 00:49:56.502392 systemd[1]: Created slice system-addon\x2drun.slice. May 10 00:49:56.502411 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 10 00:49:56.502431 systemd[1]: Created slice system-getty.slice. May 10 00:49:56.502458 systemd[1]: Created slice system-modprobe.slice. May 10 00:49:56.502476 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 00:49:56.502496 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 00:49:56.502517 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 00:49:56.513017 systemd[1]: Created slice user.slice. May 10 00:49:56.513049 systemd[1]: Started systemd-ask-password-console.path. May 10 00:49:56.513083 systemd[1]: Started systemd-ask-password-wall.path. May 10 00:49:56.513104 systemd[1]: Set up automount boot.automount. May 10 00:49:56.513125 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 00:49:56.513142 systemd[1]: Stopped target initrd-switch-root.target. May 10 00:49:56.513161 systemd[1]: Stopped target initrd-fs.target. May 10 00:49:56.513180 systemd[1]: Stopped target initrd-root-fs.target. May 10 00:49:56.513198 systemd[1]: Reached target integritysetup.target. May 10 00:49:56.513216 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:49:56.513236 systemd[1]: Reached target remote-fs.target. May 10 00:49:56.513260 systemd[1]: Reached target slices.target. May 10 00:49:56.513279 systemd[1]: Reached target swap.target. May 10 00:49:56.513297 systemd[1]: Reached target torcx.target. May 10 00:49:56.513316 systemd[1]: Reached target veritysetup.target. May 10 00:49:56.513335 systemd[1]: Listening on systemd-coredump.socket. May 10 00:49:56.513354 systemd[1]: Listening on systemd-initctl.socket. May 10 00:49:56.513373 systemd[1]: Listening on systemd-networkd.socket. May 10 00:49:56.513390 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:49:56.513420 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:49:56.513442 systemd[1]: Listening on systemd-userdbd.socket. May 10 00:49:56.513467 systemd[1]: Mounting dev-hugepages.mount... May 10 00:49:56.513487 systemd[1]: Mounting dev-mqueue.mount... May 10 00:49:56.513509 systemd[1]: Mounting media.mount... May 10 00:49:56.513532 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:49:56.513554 systemd[1]: Mounting sys-kernel-debug.mount... May 10 00:49:56.513576 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 00:49:56.513595 systemd[1]: Mounting tmp.mount... May 10 00:49:56.513614 systemd[1]: Starting flatcar-tmpfiles.service... May 10 00:49:56.513634 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:49:56.513659 systemd[1]: Starting kmod-static-nodes.service... May 10 00:49:56.513679 systemd[1]: Starting modprobe@configfs.service... May 10 00:49:56.513696 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:49:56.513716 systemd[1]: Starting modprobe@drm.service... May 10 00:49:56.513737 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:49:56.513755 systemd[1]: Starting modprobe@fuse.service... May 10 00:49:56.513774 systemd[1]: Starting modprobe@loop.service... May 10 00:49:56.513795 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:49:56.513814 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 10 00:49:56.513840 systemd[1]: Stopped systemd-fsck-root.service. May 10 00:49:56.513860 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 10 00:49:56.516358 systemd[1]: Stopped systemd-fsck-usr.service. May 10 00:49:56.516391 systemd[1]: Stopped systemd-journald.service. May 10 00:49:56.516413 systemd[1]: Starting systemd-journald.service... May 10 00:49:56.516436 systemd[1]: Starting systemd-modules-load.service... May 10 00:49:56.523982 systemd[1]: Starting systemd-network-generator.service... May 10 00:49:56.524007 systemd[1]: Starting systemd-remount-fs.service... May 10 00:49:56.524028 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:49:56.524060 systemd[1]: verity-setup.service: Deactivated successfully. May 10 00:49:56.524080 systemd[1]: Stopped verity-setup.service. May 10 00:49:56.524099 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:49:56.524118 systemd[1]: Mounted dev-hugepages.mount. May 10 00:49:56.524137 systemd[1]: Mounted dev-mqueue.mount. May 10 00:49:56.524154 systemd[1]: Mounted media.mount. May 10 00:49:56.524170 systemd[1]: Mounted sys-kernel-debug.mount. May 10 00:49:56.524187 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 00:49:56.524205 systemd[1]: Mounted tmp.mount. May 10 00:49:56.524230 systemd[1]: Finished kmod-static-nodes.service. May 10 00:49:56.524250 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 00:49:56.524269 systemd[1]: Finished modprobe@configfs.service. May 10 00:49:56.524287 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:49:56.524304 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:49:56.524326 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:49:56.524344 systemd[1]: Finished modprobe@drm.service. May 10 00:49:56.524360 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:49:56.524378 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:49:56.524398 kernel: loop: module loaded May 10 00:49:56.524421 systemd[1]: Finished systemd-network-generator.service. May 10 00:49:56.524442 systemd[1]: Finished systemd-remount-fs.service. May 10 00:49:56.524463 systemd[1]: Reached target network-pre.target. May 10 00:49:56.524482 systemd[1]: Mounting sys-kernel-config.mount... May 10 00:49:56.524508 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:49:56.524526 systemd[1]: Starting systemd-hwdb-update.service... May 10 00:49:56.524544 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:49:56.524561 systemd[1]: Starting systemd-random-seed.service... May 10 00:49:56.524578 kernel: fuse: init (API version 7.34) May 10 00:49:56.524596 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:49:56.524617 systemd[1]: Finished modprobe@loop.service. May 10 00:49:56.524642 systemd[1]: Finished systemd-modules-load.service. May 10 00:49:56.524660 systemd[1]: Mounted sys-kernel-config.mount. May 10 00:49:56.524681 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:49:56.524699 systemd[1]: Starting systemd-sysctl.service... May 10 00:49:56.524730 systemd-journald[957]: Journal started May 10 00:49:56.524840 systemd-journald[957]: Runtime Journal (/run/log/journal/add3f394f4b74197a544bbeb95790a10) is 4.9M, max 39.5M, 34.5M free. May 10 00:49:52.765000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 00:49:52.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:49:52.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:49:52.855000 audit: BPF prog-id=10 op=LOAD May 10 00:49:52.855000 audit: BPF prog-id=10 op=UNLOAD May 10 00:49:52.855000 audit: BPF prog-id=11 op=LOAD May 10 00:49:52.855000 audit: BPF prog-id=11 op=UNLOAD May 10 00:49:53.005000 audit[887]: AVC avc: denied { associate } for pid=887 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:49:53.005000 audit[887]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d892 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=870 pid=887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:53.005000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:49:53.007000 audit[887]: AVC avc: denied { associate } for pid=887 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 10 00:49:53.007000 audit[887]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d969 a2=1ed a3=0 items=2 ppid=870 pid=887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:53.007000 audit: CWD cwd="/" May 10 00:49:53.007000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:53.007000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:53.007000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:49:56.532542 systemd[1]: Started systemd-journald.service. May 10 00:49:56.266000 audit: BPF prog-id=12 op=LOAD May 10 00:49:56.266000 audit: BPF prog-id=3 op=UNLOAD May 10 00:49:56.266000 audit: BPF prog-id=13 op=LOAD May 10 00:49:56.266000 audit: BPF prog-id=14 op=LOAD May 10 00:49:56.266000 audit: BPF prog-id=4 op=UNLOAD May 10 00:49:56.266000 audit: BPF prog-id=5 op=UNLOAD May 10 00:49:56.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.279000 audit: BPF prog-id=12 op=UNLOAD May 10 00:49:56.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.398000 audit: BPF prog-id=15 op=LOAD May 10 00:49:56.398000 audit: BPF prog-id=16 op=LOAD May 10 00:49:56.398000 audit: BPF prog-id=17 op=LOAD May 10 00:49:56.398000 audit: BPF prog-id=13 op=UNLOAD May 10 00:49:56.398000 audit: BPF prog-id=14 op=UNLOAD May 10 00:49:56.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.494000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 00:49:56.494000 audit[957]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fffd257b370 a2=4000 a3=7fffd257b40c items=0 ppid=1 pid=957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:56.494000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 00:49:56.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:53.002650 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:49:56.262529 systemd[1]: Queued start job for default target multi-user.target. May 10 00:49:56.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:53.003235 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:53Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:49:56.262552 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 10 00:49:53.003269 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:53Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:49:56.269530 systemd[1]: systemd-journald.service: Deactivated successfully. May 10 00:49:53.003328 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:53Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 10 00:49:56.532428 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 00:49:53.003345 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:53Z" level=debug msg="skipped missing lower profile" missing profile=oem May 10 00:49:56.532640 systemd[1]: Finished modprobe@fuse.service. May 10 00:49:53.003413 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:53Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 10 00:49:56.536785 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 00:49:53.003436 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:53Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 10 00:49:56.539228 systemd[1]: Starting systemd-journal-flush.service... May 10 00:49:53.003810 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:53Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 10 00:49:56.546181 systemd[1]: Finished systemd-random-seed.service. May 10 00:49:53.003960 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:53Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:49:56.546952 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 00:49:53.003982 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:53Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:49:56.547375 systemd[1]: Reached target first-boot-complete.target. May 10 00:49:56.558111 systemd-journald[957]: Time spent on flushing to /var/log/journal/add3f394f4b74197a544bbeb95790a10 is 78.908ms for 1127 entries. May 10 00:49:56.558111 systemd-journald[957]: System Journal (/var/log/journal/add3f394f4b74197a544bbeb95790a10) is 8.0M, max 195.6M, 187.6M free. May 10 00:49:56.659790 systemd-journald[957]: Received client request to flush runtime journal. May 10 00:49:56.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:53.005552 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:53Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 10 00:49:56.584089 systemd[1]: Finished systemd-sysctl.service. May 10 00:49:53.005599 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:53Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 10 00:49:53.005624 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:53Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 10 00:49:53.005641 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:53Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 10 00:49:53.005665 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:53Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 10 00:49:56.661711 systemd[1]: Finished systemd-journal-flush.service. May 10 00:49:53.005679 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:53Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 10 00:49:56.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:55.647523 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:55Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:49:55.648065 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:55Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:49:55.648271 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:55Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:49:55.648653 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:55Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:49:55.648748 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:55Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 10 00:49:55.648896 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2025-05-10T00:49:55Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 10 00:49:56.694615 systemd[1]: Finished flatcar-tmpfiles.service. May 10 00:49:56.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.697023 systemd[1]: Starting systemd-sysusers.service... May 10 00:49:56.722417 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:49:56.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:56.724909 systemd[1]: Starting systemd-udev-settle.service... May 10 00:49:56.746219 udevadm[997]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 10 00:49:56.756379 systemd[1]: Finished systemd-sysusers.service. May 10 00:49:56.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:57.483216 systemd[1]: Finished systemd-hwdb-update.service. May 10 00:49:57.486936 kernel: kauditd_printk_skb: 95 callbacks suppressed May 10 00:49:57.487141 kernel: audit: type=1130 audit(1746838197.482:136): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:57.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:57.490445 kernel: audit: type=1334 audit(1746838197.486:137): prog-id=18 op=LOAD May 10 00:49:57.490626 kernel: audit: type=1334 audit(1746838197.486:138): prog-id=19 op=LOAD May 10 00:49:57.486000 audit: BPF prog-id=18 op=LOAD May 10 00:49:57.486000 audit: BPF prog-id=19 op=LOAD May 10 00:49:57.488435 systemd[1]: Starting systemd-udevd.service... May 10 00:49:57.486000 audit: BPF prog-id=7 op=UNLOAD May 10 00:49:57.492207 kernel: audit: type=1334 audit(1746838197.486:139): prog-id=7 op=UNLOAD May 10 00:49:57.486000 audit: BPF prog-id=8 op=UNLOAD May 10 00:49:57.493568 kernel: audit: type=1334 audit(1746838197.486:140): prog-id=8 op=UNLOAD May 10 00:49:57.520766 systemd-udevd[998]: Using default interface naming scheme 'v252'. May 10 00:49:57.553447 systemd[1]: Started systemd-udevd.service. May 10 00:49:57.563110 kernel: audit: type=1130 audit(1746838197.553:141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:57.563268 kernel: audit: type=1334 audit(1746838197.555:142): prog-id=20 op=LOAD May 10 00:49:57.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:57.555000 audit: BPF prog-id=20 op=LOAD May 10 00:49:57.564300 systemd[1]: Starting systemd-networkd.service... May 10 00:49:57.583681 kernel: audit: type=1334 audit(1746838197.577:143): prog-id=21 op=LOAD May 10 00:49:57.583831 kernel: audit: type=1334 audit(1746838197.577:144): prog-id=22 op=LOAD May 10 00:49:57.583882 kernel: audit: type=1334 audit(1746838197.577:145): prog-id=23 op=LOAD May 10 00:49:57.577000 audit: BPF prog-id=21 op=LOAD May 10 00:49:57.577000 audit: BPF prog-id=22 op=LOAD May 10 00:49:57.577000 audit: BPF prog-id=23 op=LOAD May 10 00:49:57.579390 systemd[1]: Starting systemd-userdbd.service... May 10 00:49:57.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:57.636706 systemd[1]: Started systemd-userdbd.service. May 10 00:49:57.656230 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 10 00:49:57.686216 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:49:57.686595 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:49:57.689614 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:49:57.694046 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:49:57.698498 systemd[1]: Starting modprobe@loop.service... May 10 00:49:57.699169 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:49:57.699334 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:49:57.699529 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:49:57.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:57.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:57.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:57.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:57.727756 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:49:57.728053 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:49:57.730489 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:49:57.730739 systemd[1]: Finished modprobe@loop.service. May 10 00:49:57.742333 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:49:57.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:57.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:57.744407 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:49:57.744650 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:49:57.745444 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:49:57.804569 systemd-networkd[1006]: lo: Link UP May 10 00:49:57.805158 systemd-networkd[1006]: lo: Gained carrier May 10 00:49:57.806136 systemd-networkd[1006]: Enumeration completed May 10 00:49:57.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:57.806443 systemd[1]: Started systemd-networkd.service. May 10 00:49:57.807469 systemd-networkd[1006]: eth1: Configuring with /run/systemd/network/10-de:f7:3c:64:37:9c.network. May 10 00:49:57.809143 systemd-networkd[1006]: eth0: Configuring with /run/systemd/network/10-46:e0:81:e1:c0:ff.network. May 10 00:49:57.810520 systemd-networkd[1006]: eth1: Link UP May 10 00:49:57.810621 systemd-networkd[1006]: eth1: Gained carrier May 10 00:49:57.815327 systemd-networkd[1006]: eth0: Link UP May 10 00:49:57.815342 systemd-networkd[1006]: eth0: Gained carrier May 10 00:49:57.830897 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 10 00:49:57.842897 kernel: ACPI: button: Power Button [PWRF] May 10 00:49:57.848427 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:49:57.866000 audit[999]: AVC avc: denied { confidentiality } for pid=999 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:49:57.866000 audit[999]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5592ce8494a0 a1=338ac a2=7f55a8130bc5 a3=5 items=110 ppid=998 pid=999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:57.866000 audit: CWD cwd="/" May 10 00:49:57.866000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=1 name=(null) inode=14534 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=2 name=(null) inode=14534 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=3 name=(null) inode=14535 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=4 name=(null) inode=14534 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=5 name=(null) inode=14536 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=6 name=(null) inode=14534 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=7 name=(null) inode=14537 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=8 name=(null) inode=14537 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=9 name=(null) inode=14538 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=10 name=(null) inode=14537 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=11 name=(null) inode=14539 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=12 name=(null) inode=14537 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=13 name=(null) inode=14540 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=14 name=(null) inode=14537 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=15 name=(null) inode=14541 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=16 name=(null) inode=14537 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=17 name=(null) inode=14542 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=18 name=(null) inode=14534 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=19 name=(null) inode=14543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=20 name=(null) inode=14543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=21 name=(null) inode=14544 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=22 name=(null) inode=14543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=23 name=(null) inode=14545 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=24 name=(null) inode=14543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=25 name=(null) inode=14546 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=26 name=(null) inode=14543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=27 name=(null) inode=14547 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=28 name=(null) inode=14543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=29 name=(null) inode=14548 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=30 name=(null) inode=14534 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=31 name=(null) inode=14549 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=32 name=(null) inode=14549 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=33 name=(null) inode=14550 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=34 name=(null) inode=14549 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=35 name=(null) inode=14551 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=36 name=(null) inode=14549 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=37 name=(null) inode=14552 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=38 name=(null) inode=14549 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=39 name=(null) inode=14553 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=40 name=(null) inode=14549 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=41 name=(null) inode=14554 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=42 name=(null) inode=14534 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=43 name=(null) inode=14555 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=44 name=(null) inode=14555 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=45 name=(null) inode=14556 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=46 name=(null) inode=14555 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=47 name=(null) inode=14557 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=48 name=(null) inode=14555 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=49 name=(null) inode=14558 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=50 name=(null) inode=14555 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=51 name=(null) inode=14559 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=52 name=(null) inode=14555 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=53 name=(null) inode=14560 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=55 name=(null) inode=14561 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=56 name=(null) inode=14561 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=57 name=(null) inode=14562 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=58 name=(null) inode=14561 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=59 name=(null) inode=14563 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=60 name=(null) inode=14561 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=61 name=(null) inode=14564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=62 name=(null) inode=14564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=63 name=(null) inode=14565 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=64 name=(null) inode=14564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=65 name=(null) inode=14566 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=66 name=(null) inode=14564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=67 name=(null) inode=14567 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=68 name=(null) inode=14564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=69 name=(null) inode=14568 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=70 name=(null) inode=14564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=71 name=(null) inode=14569 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=72 name=(null) inode=14561 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=73 name=(null) inode=14570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=74 name=(null) inode=14570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=75 name=(null) inode=14571 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=76 name=(null) inode=14570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=77 name=(null) inode=14572 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=78 name=(null) inode=14570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=79 name=(null) inode=14573 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=80 name=(null) inode=14570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=81 name=(null) inode=14574 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=82 name=(null) inode=14570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=83 name=(null) inode=14575 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=84 name=(null) inode=14561 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=85 name=(null) inode=14576 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=86 name=(null) inode=14576 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=87 name=(null) inode=14577 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=88 name=(null) inode=14576 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=89 name=(null) inode=14578 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=90 name=(null) inode=14576 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=91 name=(null) inode=14579 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.877918 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 May 10 00:49:57.866000 audit: PATH item=92 name=(null) inode=14576 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=93 name=(null) inode=14580 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=94 name=(null) inode=14576 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=95 name=(null) inode=14581 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=96 name=(null) inode=14561 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=97 name=(null) inode=14582 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=98 name=(null) inode=14582 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=99 name=(null) inode=14583 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=100 name=(null) inode=14582 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=101 name=(null) inode=14584 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=102 name=(null) inode=14582 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=103 name=(null) inode=14585 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=104 name=(null) inode=14582 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=105 name=(null) inode=14586 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=106 name=(null) inode=14582 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=107 name=(null) inode=14587 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PATH item=109 name=(null) inode=14588 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:57.866000 audit: PROCTITLE proctitle="(udev-worker)" May 10 00:49:57.890982 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 10 00:49:57.923894 kernel: mousedev: PS/2 mouse device common for all mice May 10 00:49:58.055898 kernel: EDAC MC: Ver: 3.0.0 May 10 00:49:58.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.080786 systemd[1]: Finished systemd-udev-settle.service. May 10 00:49:58.083532 systemd[1]: Starting lvm2-activation-early.service... May 10 00:49:58.105097 lvm[1036]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:49:58.131317 systemd[1]: Finished lvm2-activation-early.service. May 10 00:49:58.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.131934 systemd[1]: Reached target cryptsetup.target. May 10 00:49:58.133842 systemd[1]: Starting lvm2-activation.service... May 10 00:49:58.139396 lvm[1037]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:49:58.166510 systemd[1]: Finished lvm2-activation.service. May 10 00:49:58.167146 systemd[1]: Reached target local-fs-pre.target. May 10 00:49:58.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.169460 systemd[1]: Mounting media-configdrive.mount... May 10 00:49:58.169917 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 00:49:58.169978 systemd[1]: Reached target machines.target. May 10 00:49:58.171856 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 00:49:58.186651 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 00:49:58.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.190889 kernel: ISO 9660 Extensions: RRIP_1991A May 10 00:49:58.192607 systemd[1]: Mounted media-configdrive.mount. May 10 00:49:58.193277 systemd[1]: Reached target local-fs.target. May 10 00:49:58.196426 systemd[1]: Starting ldconfig.service... May 10 00:49:58.197547 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:49:58.197658 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:49:58.199841 systemd[1]: Starting systemd-boot-update.service... May 10 00:49:58.204437 systemd[1]: Starting systemd-machine-id-commit.service... May 10 00:49:58.206825 systemd[1]: Starting systemd-sysext.service... May 10 00:49:58.214460 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1043 (bootctl) May 10 00:49:58.216351 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 00:49:58.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.252272 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 00:49:58.253579 systemd[1]: Finished systemd-machine-id-commit.service. May 10 00:49:58.257751 systemd[1]: Unmounting usr-share-oem.mount... May 10 00:49:58.268628 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 10 00:49:58.268890 systemd[1]: Unmounted usr-share-oem.mount. May 10 00:49:58.281895 kernel: loop0: detected capacity change from 0 to 218376 May 10 00:49:58.306218 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 10 00:49:58.318684 systemd-fsck[1048]: fsck.fat 4.2 (2021-01-31) May 10 00:49:58.318684 systemd-fsck[1048]: /dev/vda1: 790 files, 120688/258078 clusters May 10 00:49:58.320730 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 00:49:58.323926 kernel: loop1: detected capacity change from 0 to 218376 May 10 00:49:58.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.323413 systemd[1]: Mounting boot.mount... May 10 00:49:58.338303 (sd-sysext)[1053]: Using extensions 'kubernetes'. May 10 00:49:58.339379 (sd-sysext)[1053]: Merged extensions into '/usr'. May 10 00:49:58.357401 systemd[1]: Mounted boot.mount. May 10 00:49:58.367826 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:49:58.370183 systemd[1]: Mounting usr-share-oem.mount... May 10 00:49:58.371237 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:49:58.379042 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:49:58.389089 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:49:58.394858 systemd[1]: Starting modprobe@loop.service... May 10 00:49:58.396089 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:49:58.396344 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:49:58.396561 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:49:58.397900 systemd[1]: Finished systemd-boot-update.service. May 10 00:49:58.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.400608 systemd[1]: Mounted usr-share-oem.mount. May 10 00:49:58.401398 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:49:58.401578 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:49:58.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.402744 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:49:58.402962 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:49:58.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.403737 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:49:58.403918 systemd[1]: Finished modprobe@loop.service. May 10 00:49:58.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.406639 systemd[1]: Finished systemd-sysext.service. May 10 00:49:58.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.410015 systemd[1]: Starting ensure-sysext.service... May 10 00:49:58.410462 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:49:58.410593 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:49:58.412218 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 00:49:58.430891 systemd[1]: Reloading. May 10 00:49:58.450455 systemd-tmpfiles[1061]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 00:49:58.455907 systemd-tmpfiles[1061]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 00:49:58.462454 systemd-tmpfiles[1061]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 00:49:58.683093 /usr/lib/systemd/system-generators/torcx-generator[1089]: time="2025-05-10T00:49:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:49:58.683752 /usr/lib/systemd/system-generators/torcx-generator[1089]: time="2025-05-10T00:49:58Z" level=info msg="torcx already run" May 10 00:49:58.695282 ldconfig[1042]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 00:49:58.791411 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:49:58.791435 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:49:58.813057 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:49:58.878000 audit: BPF prog-id=24 op=LOAD May 10 00:49:58.878000 audit: BPF prog-id=20 op=UNLOAD May 10 00:49:58.879000 audit: BPF prog-id=25 op=LOAD May 10 00:49:58.879000 audit: BPF prog-id=15 op=UNLOAD May 10 00:49:58.879000 audit: BPF prog-id=26 op=LOAD May 10 00:49:58.879000 audit: BPF prog-id=27 op=LOAD May 10 00:49:58.879000 audit: BPF prog-id=16 op=UNLOAD May 10 00:49:58.879000 audit: BPF prog-id=17 op=UNLOAD May 10 00:49:58.881000 audit: BPF prog-id=28 op=LOAD May 10 00:49:58.881000 audit: BPF prog-id=21 op=UNLOAD May 10 00:49:58.881000 audit: BPF prog-id=29 op=LOAD May 10 00:49:58.881000 audit: BPF prog-id=30 op=LOAD May 10 00:49:58.881000 audit: BPF prog-id=22 op=UNLOAD May 10 00:49:58.881000 audit: BPF prog-id=23 op=UNLOAD May 10 00:49:58.882000 audit: BPF prog-id=31 op=LOAD May 10 00:49:58.882000 audit: BPF prog-id=32 op=LOAD May 10 00:49:58.882000 audit: BPF prog-id=18 op=UNLOAD May 10 00:49:58.882000 audit: BPF prog-id=19 op=UNLOAD May 10 00:49:58.886732 systemd[1]: Finished ldconfig.service. May 10 00:49:58.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.887435 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 00:49:58.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.892696 systemd[1]: Starting audit-rules.service... May 10 00:49:58.894409 systemd[1]: Starting clean-ca-certificates.service... May 10 00:49:58.896365 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 00:49:58.896000 audit: BPF prog-id=33 op=LOAD May 10 00:49:58.900747 systemd[1]: Starting systemd-resolved.service... May 10 00:49:58.901000 audit: BPF prog-id=34 op=LOAD May 10 00:49:58.905089 systemd[1]: Starting systemd-timesyncd.service... May 10 00:49:58.906817 systemd[1]: Starting systemd-update-utmp.service... May 10 00:49:58.914539 systemd[1]: Finished clean-ca-certificates.service. May 10 00:49:58.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.915097 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:49:58.928859 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:49:58.930537 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:49:58.933540 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:49:58.935821 systemd[1]: Starting modprobe@loop.service... May 10 00:49:58.936712 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:49:58.936890 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:49:58.937019 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:49:58.938071 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:49:58.938239 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:49:58.938000 audit[1134]: SYSTEM_BOOT pid=1134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 00:49:58.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.943628 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:49:58.948442 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:49:58.949164 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:49:58.949399 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:49:58.949622 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:49:58.953623 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:49:58.953852 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:49:58.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.955147 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:49:58.955318 systemd[1]: Finished modprobe@loop.service. May 10 00:49:58.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.962851 systemd[1]: Finished systemd-update-utmp.service. May 10 00:49:58.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.963751 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:49:58.964026 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:49:58.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.966567 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:49:58.968072 systemd[1]: Starting modprobe@drm.service... May 10 00:49:58.971071 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:49:58.974187 systemd[1]: Starting modprobe@loop.service... May 10 00:49:58.974783 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:49:58.974914 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:49:58.976585 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:49:58.977279 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:49:58.978733 systemd[1]: Finished ensure-sysext.service. May 10 00:49:58.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.980450 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:49:58.980612 systemd[1]: Finished modprobe@drm.service. May 10 00:49:58.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.983287 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:49:58.983416 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:49:58.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.984005 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:49:58.984118 systemd[1]: Finished modprobe@loop.service. May 10 00:49:58.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.985426 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:49:58.985477 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:49:58.997188 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 00:49:58.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.999267 systemd[1]: Starting systemd-update-done.service... May 10 00:49:59.011638 systemd[1]: Finished systemd-update-done.service. May 10 00:49:59.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:59.042000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 00:49:59.042000 audit[1158]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc49bdee0 a2=420 a3=0 items=0 ppid=1129 pid=1158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:59.042000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 00:49:59.043656 augenrules[1158]: No rules May 10 00:49:59.044264 systemd[1]: Finished audit-rules.service. May 10 00:49:59.055782 systemd[1]: Started systemd-timesyncd.service. May 10 00:49:59.056268 systemd[1]: Reached target time-set.target. May 10 00:49:59.060833 systemd-resolved[1132]: Positive Trust Anchors: May 10 00:49:59.061245 systemd-resolved[1132]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:49:59.061368 systemd-resolved[1132]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:49:59.064114 systemd-networkd[1006]: eth1: Gained IPv6LL May 10 00:49:59.066339 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 00:49:59.071711 systemd-resolved[1132]: Using system hostname 'ci-3510.3.7-n-09020fac35'. May 10 00:49:59.075324 systemd[1]: Started systemd-resolved.service. May 10 00:49:59.075882 systemd[1]: Reached target network.target. May 10 00:49:59.076179 systemd[1]: Reached target network-online.target. May 10 00:49:59.076461 systemd[1]: Reached target nss-lookup.target. May 10 00:49:59.076745 systemd[1]: Reached target sysinit.target. May 10 00:49:59.077215 systemd[1]: Started motdgen.path. May 10 00:49:59.077588 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 00:49:59.078343 systemd[1]: Started logrotate.timer. May 10 00:49:59.079022 systemd[1]: Started mdadm.timer. May 10 00:49:59.079457 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 00:49:59.079935 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 00:49:59.079991 systemd[1]: Reached target paths.target. May 10 00:49:59.080472 systemd[1]: Reached target timers.target. May 10 00:49:59.081469 systemd[1]: Listening on dbus.socket. May 10 00:49:59.083833 systemd[1]: Starting docker.socket... May 10 00:49:59.088289 systemd[1]: Listening on sshd.socket. May 10 00:49:59.089208 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:49:59.090035 systemd[1]: Listening on docker.socket. May 10 00:49:59.090682 systemd[1]: Reached target sockets.target. May 10 00:49:59.091149 systemd[1]: Reached target basic.target. May 10 00:49:59.091493 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:49:59.091521 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:49:59.092696 systemd[1]: Starting containerd.service... May 10 00:49:59.094235 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 10 00:49:59.096518 systemd[1]: Starting dbus.service... May 10 00:49:59.100112 systemd[1]: Starting enable-oem-cloudinit.service... May 10 00:49:59.102415 systemd[1]: Starting extend-filesystems.service... May 10 00:49:59.620851 jq[1171]: false May 10 00:49:59.103190 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 00:49:59.105466 systemd[1]: Starting kubelet.service... May 10 00:49:59.108054 systemd[1]: Starting motdgen.service... May 10 00:49:59.111180 systemd[1]: Starting prepare-helm.service... May 10 00:49:59.112853 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 00:49:59.616910 systemd-timesyncd[1133]: Contacted time server 172.245.210.108:123 (0.flatcar.pool.ntp.org). May 10 00:49:59.616979 systemd-timesyncd[1133]: Initial clock synchronization to Sat 2025-05-10 00:49:59.616010 UTC. May 10 00:49:59.617658 systemd[1]: Starting sshd-keygen.service... May 10 00:49:59.620692 systemd-resolved[1132]: Clock change detected. Flushing caches. May 10 00:49:59.623909 systemd[1]: Starting systemd-logind.service... May 10 00:49:59.624339 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:49:59.624442 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 10 00:49:59.625057 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 10 00:49:59.626092 systemd[1]: Starting update-engine.service... May 10 00:49:59.629499 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 00:49:59.634697 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 00:49:59.634919 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 00:49:59.656581 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 00:49:59.656822 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 00:49:59.658187 jq[1181]: true May 10 00:49:59.690487 jq[1196]: true May 10 00:49:59.691550 tar[1186]: linux-amd64/LICENSE May 10 00:49:59.694260 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:49:59.694704 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:49:59.696593 tar[1186]: linux-amd64/helm May 10 00:49:59.700376 dbus-daemon[1168]: [system] SELinux support is enabled May 10 00:49:59.700894 systemd[1]: Started dbus.service. May 10 00:49:59.704074 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 00:49:59.704130 systemd[1]: Reached target system-config.target. May 10 00:49:59.704530 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 00:49:59.704552 systemd[1]: Reached target user-config.target. May 10 00:49:59.720037 extend-filesystems[1172]: Found loop1 May 10 00:49:59.720798 extend-filesystems[1172]: Found vda May 10 00:49:59.720798 extend-filesystems[1172]: Found vda1 May 10 00:49:59.720798 extend-filesystems[1172]: Found vda2 May 10 00:49:59.720798 extend-filesystems[1172]: Found vda3 May 10 00:49:59.720798 extend-filesystems[1172]: Found usr May 10 00:49:59.720798 extend-filesystems[1172]: Found vda4 May 10 00:49:59.720798 extend-filesystems[1172]: Found vda6 May 10 00:49:59.720798 extend-filesystems[1172]: Found vda7 May 10 00:49:59.720798 extend-filesystems[1172]: Found vda9 May 10 00:49:59.720798 extend-filesystems[1172]: Checking size of /dev/vda9 May 10 00:49:59.740742 extend-filesystems[1172]: Resized partition /dev/vda9 May 10 00:49:59.750240 systemd[1]: motdgen.service: Deactivated successfully. May 10 00:49:59.750499 systemd[1]: Finished motdgen.service. May 10 00:49:59.771502 extend-filesystems[1210]: resize2fs 1.46.5 (30-Dec-2021) May 10 00:49:59.782654 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 15121403 blocks May 10 00:49:59.798413 update_engine[1180]: I0510 00:49:59.797959 1180 main.cc:92] Flatcar Update Engine starting May 10 00:49:59.802401 systemd[1]: Started update-engine.service. May 10 00:49:59.802669 update_engine[1180]: I0510 00:49:59.802641 1180 update_check_scheduler.cc:74] Next update check in 10m26s May 10 00:49:59.804931 systemd[1]: Started locksmithd.service. May 10 00:49:59.849567 bash[1224]: Updated "/home/core/.ssh/authorized_keys" May 10 00:49:59.850997 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 00:49:59.881939 kernel: EXT4-fs (vda9): resized filesystem to 15121403 May 10 00:49:59.898761 systemd-logind[1179]: Watching system buttons on /dev/input/event1 (Power Button) May 10 00:49:59.898801 systemd-logind[1179]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 00:49:59.902611 extend-filesystems[1210]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 10 00:49:59.902611 extend-filesystems[1210]: old_desc_blocks = 1, new_desc_blocks = 8 May 10 00:49:59.902611 extend-filesystems[1210]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. May 10 00:49:59.912273 extend-filesystems[1172]: Resized filesystem in /dev/vda9 May 10 00:49:59.912273 extend-filesystems[1172]: Found vdb May 10 00:49:59.917442 env[1194]: time="2025-05-10T00:49:59.906203029Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 00:49:59.904610 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 00:49:59.904796 systemd[1]: Finished extend-filesystems.service. May 10 00:49:59.905024 systemd-logind[1179]: New seat seat0. May 10 00:49:59.915226 systemd[1]: Started systemd-logind.service. May 10 00:49:59.926175 coreos-metadata[1167]: May 10 00:49:59.926 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 10 00:49:59.940716 coreos-metadata[1167]: May 10 00:49:59.940 INFO Fetch successful May 10 00:49:59.952800 unknown[1167]: wrote ssh authorized keys file for user: core May 10 00:49:59.967944 update-ssh-keys[1228]: Updated "/home/core/.ssh/authorized_keys" May 10 00:49:59.968638 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 10 00:49:59.998248 env[1194]: time="2025-05-10T00:49:59.988608581Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 00:49:59.998580 env[1194]: time="2025-05-10T00:49:59.998555606Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 00:50:00.000941 env[1194]: time="2025-05-10T00:50:00.000873316Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 00:50:00.001161 env[1194]: time="2025-05-10T00:50:00.001129012Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 00:50:00.001732 env[1194]: time="2025-05-10T00:50:00.001687831Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:50:00.001888 env[1194]: time="2025-05-10T00:50:00.001854853Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 00:50:00.002052 env[1194]: time="2025-05-10T00:50:00.002015828Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 00:50:00.002237 env[1194]: time="2025-05-10T00:50:00.002204829Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 00:50:00.002646 env[1194]: time="2025-05-10T00:50:00.002571442Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 00:50:00.003231 env[1194]: time="2025-05-10T00:50:00.003198111Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 00:50:00.004933 env[1194]: time="2025-05-10T00:50:00.004884624Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:50:00.009748 env[1194]: time="2025-05-10T00:50:00.009690674Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 00:50:00.010164 env[1194]: time="2025-05-10T00:50:00.010117871Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 00:50:00.012044 env[1194]: time="2025-05-10T00:50:00.011979441Z" level=info msg="metadata content store policy set" policy=shared May 10 00:50:00.016647 env[1194]: time="2025-05-10T00:50:00.016582493Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 00:50:00.016900 env[1194]: time="2025-05-10T00:50:00.016875183Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 00:50:00.017001 env[1194]: time="2025-05-10T00:50:00.016985306Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 00:50:00.017158 env[1194]: time="2025-05-10T00:50:00.017131457Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 00:50:00.017284 env[1194]: time="2025-05-10T00:50:00.017259954Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 00:50:00.017398 env[1194]: time="2025-05-10T00:50:00.017376911Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 00:50:00.017487 env[1194]: time="2025-05-10T00:50:00.017468125Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 00:50:00.017568 env[1194]: time="2025-05-10T00:50:00.017553568Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 00:50:00.017663 env[1194]: time="2025-05-10T00:50:00.017641220Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 00:50:00.017799 env[1194]: time="2025-05-10T00:50:00.017773799Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 00:50:00.017887 env[1194]: time="2025-05-10T00:50:00.017870986Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 00:50:00.017952 env[1194]: time="2025-05-10T00:50:00.017938182Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 00:50:00.018259 env[1194]: time="2025-05-10T00:50:00.018222127Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 00:50:00.018516 env[1194]: time="2025-05-10T00:50:00.018489982Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 00:50:00.018998 env[1194]: time="2025-05-10T00:50:00.018967771Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 00:50:00.020332 env[1194]: time="2025-05-10T00:50:00.020293244Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 00:50:00.020463 env[1194]: time="2025-05-10T00:50:00.020442357Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 00:50:00.020661 env[1194]: time="2025-05-10T00:50:00.020614185Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 00:50:00.020788 env[1194]: time="2025-05-10T00:50:00.020766543Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 00:50:00.020888 env[1194]: time="2025-05-10T00:50:00.020867526Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 00:50:00.020984 env[1194]: time="2025-05-10T00:50:00.020964256Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 00:50:00.021072 env[1194]: time="2025-05-10T00:50:00.021052613Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 00:50:00.021199 env[1194]: time="2025-05-10T00:50:00.021177046Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 00:50:00.021296 env[1194]: time="2025-05-10T00:50:00.021275362Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 00:50:00.021413 env[1194]: time="2025-05-10T00:50:00.021390341Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 00:50:00.021542 env[1194]: time="2025-05-10T00:50:00.021519573Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 00:50:00.021916 env[1194]: time="2025-05-10T00:50:00.021883151Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 00:50:00.022038 env[1194]: time="2025-05-10T00:50:00.022016060Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 00:50:00.022132 env[1194]: time="2025-05-10T00:50:00.022113921Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 00:50:00.022482 env[1194]: time="2025-05-10T00:50:00.022453859Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 00:50:00.022605 env[1194]: time="2025-05-10T00:50:00.022578025Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 00:50:00.022705 env[1194]: time="2025-05-10T00:50:00.022688211Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 00:50:00.022805 env[1194]: time="2025-05-10T00:50:00.022782554Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 00:50:00.022938 env[1194]: time="2025-05-10T00:50:00.022919437Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 00:50:00.023334 env[1194]: time="2025-05-10T00:50:00.023250753Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 00:50:00.025397 env[1194]: time="2025-05-10T00:50:00.024708366Z" level=info msg="Connect containerd service" May 10 00:50:00.025397 env[1194]: time="2025-05-10T00:50:00.024774010Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 00:50:00.026470 env[1194]: time="2025-05-10T00:50:00.026433137Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:50:00.030978 env[1194]: time="2025-05-10T00:50:00.030914443Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 00:50:00.033699 env[1194]: time="2025-05-10T00:50:00.032084629Z" level=info msg="Start subscribing containerd event" May 10 00:50:00.034465 env[1194]: time="2025-05-10T00:50:00.034415892Z" level=info msg="Start recovering state" May 10 00:50:00.034787 env[1194]: time="2025-05-10T00:50:00.034764292Z" level=info msg="Start event monitor" May 10 00:50:00.034906 env[1194]: time="2025-05-10T00:50:00.034889708Z" level=info msg="Start snapshots syncer" May 10 00:50:00.034991 env[1194]: time="2025-05-10T00:50:00.034972232Z" level=info msg="Start cni network conf syncer for default" May 10 00:50:00.035109 env[1194]: time="2025-05-10T00:50:00.035086127Z" level=info msg="Start streaming server" May 10 00:50:00.035572 env[1194]: time="2025-05-10T00:50:00.035543605Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 00:50:00.041854 env[1194]: time="2025-05-10T00:50:00.041807860Z" level=info msg="containerd successfully booted in 0.155098s" May 10 00:50:00.041992 systemd[1]: Started containerd.service. May 10 00:50:00.077939 systemd-networkd[1006]: eth0: Gained IPv6LL May 10 00:50:00.790060 tar[1186]: linux-amd64/README.md May 10 00:50:00.801893 systemd[1]: Finished prepare-helm.service. May 10 00:50:00.900256 locksmithd[1223]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 00:50:01.508487 systemd[1]: Started kubelet.service. May 10 00:50:02.088865 systemd[1]: Created slice system-sshd.slice. May 10 00:50:02.537546 sshd_keygen[1198]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 00:50:02.586515 systemd[1]: Finished sshd-keygen.service. May 10 00:50:02.591305 systemd[1]: Starting issuegen.service... May 10 00:50:02.596098 systemd[1]: Started sshd@0-146.190.154.235:22-139.178.68.195:46016.service. May 10 00:50:02.610748 systemd[1]: issuegen.service: Deactivated successfully. May 10 00:50:02.611020 systemd[1]: Finished issuegen.service. May 10 00:50:02.614875 systemd[1]: Starting systemd-user-sessions.service... May 10 00:50:02.643494 systemd[1]: Finished systemd-user-sessions.service. May 10 00:50:02.647869 systemd[1]: Started getty@tty1.service. May 10 00:50:02.652962 systemd[1]: Started serial-getty@ttyS0.service. May 10 00:50:02.654171 systemd[1]: Reached target getty.target. May 10 00:50:02.656031 systemd[1]: Reached target multi-user.target. May 10 00:50:02.662539 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 00:50:02.689207 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 00:50:02.689478 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 00:50:02.690256 systemd[1]: Startup finished in 905ms (kernel) + 4.903s (initrd) + 9.484s (userspace) = 15.293s. May 10 00:50:02.790026 sshd[1254]: Accepted publickey for core from 139.178.68.195 port 46016 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:02.795405 sshd[1254]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:02.849196 systemd[1]: Created slice user-500.slice. May 10 00:50:02.852053 systemd[1]: Starting user-runtime-dir@500.service... May 10 00:50:02.858471 systemd-logind[1179]: New session 1 of user core. May 10 00:50:02.877600 systemd[1]: Finished user-runtime-dir@500.service. May 10 00:50:02.880869 systemd[1]: Starting user@500.service... May 10 00:50:02.888510 (systemd)[1264]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:03.025559 kubelet[1239]: E0510 00:50:03.025444 1239 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:50:03.028010 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:50:03.028193 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:50:03.028556 systemd[1]: kubelet.service: Consumed 1.548s CPU time. May 10 00:50:03.032926 systemd[1264]: Queued start job for default target default.target. May 10 00:50:03.034517 systemd[1264]: Reached target paths.target. May 10 00:50:03.034555 systemd[1264]: Reached target sockets.target. May 10 00:50:03.034577 systemd[1264]: Reached target timers.target. May 10 00:50:03.034597 systemd[1264]: Reached target basic.target. May 10 00:50:03.034693 systemd[1264]: Reached target default.target. May 10 00:50:03.034741 systemd[1264]: Startup finished in 129ms. May 10 00:50:03.034820 systemd[1]: Started user@500.service. May 10 00:50:03.037131 systemd[1]: Started session-1.scope. May 10 00:50:03.122815 systemd[1]: Started sshd@1-146.190.154.235:22-139.178.68.195:46030.service. May 10 00:50:03.203641 sshd[1273]: Accepted publickey for core from 139.178.68.195 port 46030 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:03.213113 sshd[1273]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:03.229131 systemd[1]: Started session-2.scope. May 10 00:50:03.231309 systemd-logind[1179]: New session 2 of user core. May 10 00:50:03.322583 sshd[1273]: pam_unix(sshd:session): session closed for user core May 10 00:50:03.331880 systemd[1]: sshd@1-146.190.154.235:22-139.178.68.195:46030.service: Deactivated successfully. May 10 00:50:03.332963 systemd[1]: session-2.scope: Deactivated successfully. May 10 00:50:03.337251 systemd-logind[1179]: Session 2 logged out. Waiting for processes to exit. May 10 00:50:03.340528 systemd[1]: Started sshd@2-146.190.154.235:22-139.178.68.195:46042.service. May 10 00:50:03.345659 systemd-logind[1179]: Removed session 2. May 10 00:50:03.400766 sshd[1279]: Accepted publickey for core from 139.178.68.195 port 46042 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:03.403463 sshd[1279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:03.412288 systemd[1]: Started session-3.scope. May 10 00:50:03.412970 systemd-logind[1179]: New session 3 of user core. May 10 00:50:03.484174 sshd[1279]: pam_unix(sshd:session): session closed for user core May 10 00:50:03.489671 systemd[1]: Started sshd@3-146.190.154.235:22-139.178.68.195:46054.service. May 10 00:50:03.491913 systemd[1]: sshd@2-146.190.154.235:22-139.178.68.195:46042.service: Deactivated successfully. May 10 00:50:03.493350 systemd[1]: session-3.scope: Deactivated successfully. May 10 00:50:03.494418 systemd-logind[1179]: Session 3 logged out. Waiting for processes to exit. May 10 00:50:03.496059 systemd-logind[1179]: Removed session 3. May 10 00:50:03.551154 sshd[1284]: Accepted publickey for core from 139.178.68.195 port 46054 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:03.553781 sshd[1284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:03.560736 systemd-logind[1179]: New session 4 of user core. May 10 00:50:03.561577 systemd[1]: Started session-4.scope. May 10 00:50:03.632798 sshd[1284]: pam_unix(sshd:session): session closed for user core May 10 00:50:03.639992 systemd[1]: Started sshd@4-146.190.154.235:22-139.178.68.195:46064.service. May 10 00:50:03.641787 systemd[1]: sshd@3-146.190.154.235:22-139.178.68.195:46054.service: Deactivated successfully. May 10 00:50:03.642831 systemd[1]: session-4.scope: Deactivated successfully. May 10 00:50:03.645018 systemd-logind[1179]: Session 4 logged out. Waiting for processes to exit. May 10 00:50:03.647079 systemd-logind[1179]: Removed session 4. May 10 00:50:03.693815 sshd[1290]: Accepted publickey for core from 139.178.68.195 port 46064 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:03.695382 sshd[1290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:03.705846 systemd-logind[1179]: New session 5 of user core. May 10 00:50:03.706465 systemd[1]: Started session-5.scope. May 10 00:50:03.786967 sudo[1294]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 00:50:03.788258 sudo[1294]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:50:03.798076 dbus-daemon[1168]: \xd0}\xf7\xb0\xdaU: received setenforce notice (enforcing=1500061648) May 10 00:50:03.801393 sudo[1294]: pam_unix(sudo:session): session closed for user root May 10 00:50:03.808029 sshd[1290]: pam_unix(sshd:session): session closed for user core May 10 00:50:03.816826 systemd[1]: sshd@4-146.190.154.235:22-139.178.68.195:46064.service: Deactivated successfully. May 10 00:50:03.818248 systemd[1]: session-5.scope: Deactivated successfully. May 10 00:50:03.819558 systemd-logind[1179]: Session 5 logged out. Waiting for processes to exit. May 10 00:50:03.822278 systemd[1]: Started sshd@5-146.190.154.235:22-139.178.68.195:46070.service. May 10 00:50:03.824348 systemd-logind[1179]: Removed session 5. May 10 00:50:03.880215 sshd[1298]: Accepted publickey for core from 139.178.68.195 port 46070 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:03.882697 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:03.892152 systemd-logind[1179]: New session 6 of user core. May 10 00:50:03.893319 systemd[1]: Started session-6.scope. May 10 00:50:03.961498 sudo[1302]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 00:50:03.961874 sudo[1302]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:50:03.966922 sudo[1302]: pam_unix(sudo:session): session closed for user root May 10 00:50:03.978050 sudo[1301]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 00:50:03.978851 sudo[1301]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:50:03.997363 systemd[1]: Stopping audit-rules.service... May 10 00:50:03.998000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:50:03.999868 auditctl[1305]: No rules May 10 00:50:04.000289 kernel: kauditd_printk_skb: 181 callbacks suppressed May 10 00:50:04.000331 kernel: audit: type=1305 audit(1746838203.998:212): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:50:03.998000 audit[1305]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff70ee9980 a2=420 a3=0 items=0 ppid=1 pid=1305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.000817 systemd[1]: audit-rules.service: Deactivated successfully. May 10 00:50:04.001083 systemd[1]: Stopped audit-rules.service. May 10 00:50:04.008155 kernel: audit: type=1300 audit(1746838203.998:212): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff70ee9980 a2=420 a3=0 items=0 ppid=1 pid=1305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.008296 kernel: audit: type=1327 audit(1746838203.998:212): proctitle=2F7362696E2F617564697463746C002D44 May 10 00:50:04.008320 kernel: audit: type=1131 audit(1746838204.000:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:03.998000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 00:50:04.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:04.004990 systemd[1]: Starting audit-rules.service... May 10 00:50:04.039234 augenrules[1322]: No rules May 10 00:50:04.041146 systemd[1]: Finished audit-rules.service. May 10 00:50:04.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:04.045665 kernel: audit: type=1130 audit(1746838204.040:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:04.045596 sudo[1301]: pam_unix(sudo:session): session closed for user root May 10 00:50:04.045000 audit[1301]: USER_END pid=1301 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:04.045000 audit[1301]: CRED_DISP pid=1301 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:04.052370 kernel: audit: type=1106 audit(1746838204.045:215): pid=1301 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:04.052492 kernel: audit: type=1104 audit(1746838204.045:216): pid=1301 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:04.053018 sshd[1298]: pam_unix(sshd:session): session closed for user core May 10 00:50:04.053000 audit[1298]: USER_END pid=1298 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:04.059200 systemd[1]: sshd@5-146.190.154.235:22-139.178.68.195:46070.service: Deactivated successfully. May 10 00:50:04.060333 systemd[1]: session-6.scope: Deactivated successfully. May 10 00:50:04.062818 kernel: audit: type=1106 audit(1746838204.053:217): pid=1298 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:04.062942 kernel: audit: type=1104 audit(1746838204.054:218): pid=1298 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:04.054000 audit[1298]: CRED_DISP pid=1298 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:04.065548 systemd-logind[1179]: Session 6 logged out. Waiting for processes to exit. May 10 00:50:04.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-146.190.154.235:22-139.178.68.195:46070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:04.067550 systemd[1]: Started sshd@6-146.190.154.235:22-139.178.68.195:46086.service. May 10 00:50:04.072060 kernel: audit: type=1131 audit(1746838204.058:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-146.190.154.235:22-139.178.68.195:46070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:04.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-146.190.154.235:22-139.178.68.195:46086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:04.073194 systemd-logind[1179]: Removed session 6. May 10 00:50:04.120000 audit[1328]: USER_ACCT pid=1328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:04.121314 sshd[1328]: Accepted publickey for core from 139.178.68.195 port 46086 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:04.122000 audit[1328]: CRED_ACQ pid=1328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:04.122000 audit[1328]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddce155e0 a2=3 a3=0 items=0 ppid=1 pid=1328 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.122000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:04.124259 sshd[1328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:04.132354 systemd[1]: Started session-7.scope. May 10 00:50:04.133387 systemd-logind[1179]: New session 7 of user core. May 10 00:50:04.148000 audit[1328]: USER_START pid=1328 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:04.151000 audit[1330]: CRED_ACQ pid=1330 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:04.207000 audit[1331]: USER_ACCT pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:04.207000 audit[1331]: CRED_REFR pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:04.208062 sudo[1331]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 10 00:50:04.208497 sudo[1331]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:50:04.211000 audit[1331]: USER_START pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:04.263753 systemd[1]: Starting docker.service... May 10 00:50:04.351899 env[1341]: time="2025-05-10T00:50:04.351757015Z" level=info msg="Starting up" May 10 00:50:04.355800 env[1341]: time="2025-05-10T00:50:04.355731227Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:50:04.355800 env[1341]: time="2025-05-10T00:50:04.355790485Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:50:04.356344 env[1341]: time="2025-05-10T00:50:04.355872792Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:50:04.356344 env[1341]: time="2025-05-10T00:50:04.355900126Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:50:04.359188 env[1341]: time="2025-05-10T00:50:04.359137763Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:50:04.359366 env[1341]: time="2025-05-10T00:50:04.359349646Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:50:04.359609 env[1341]: time="2025-05-10T00:50:04.359474097Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:50:04.359748 env[1341]: time="2025-05-10T00:50:04.359729632Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:50:04.373187 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2162923880-merged.mount: Deactivated successfully. May 10 00:50:04.479616 env[1341]: time="2025-05-10T00:50:04.479496419Z" level=info msg="Loading containers: start." May 10 00:50:04.591000 audit[1371]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1371 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.591000 audit[1371]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc7587cf10 a2=0 a3=7ffc7587cefc items=0 ppid=1341 pid=1371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.591000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 10 00:50:04.596000 audit[1373]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1373 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.596000 audit[1373]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff8ef60370 a2=0 a3=7fff8ef6035c items=0 ppid=1341 pid=1373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.596000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 10 00:50:04.599000 audit[1375]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1375 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.599000 audit[1375]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffef96ec290 a2=0 a3=7ffef96ec27c items=0 ppid=1341 pid=1375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.599000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:50:04.603000 audit[1377]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1377 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.603000 audit[1377]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd49e82df0 a2=0 a3=7ffd49e82ddc items=0 ppid=1341 pid=1377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.603000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:50:04.608000 audit[1379]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1379 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.608000 audit[1379]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc8be17940 a2=0 a3=7ffc8be1792c items=0 ppid=1341 pid=1379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.608000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 10 00:50:04.630000 audit[1384]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1384 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.630000 audit[1384]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd9472a010 a2=0 a3=7ffd94729ffc items=0 ppid=1341 pid=1384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.630000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 10 00:50:04.640000 audit[1386]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1386 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.640000 audit[1386]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff0d0c3950 a2=0 a3=7fff0d0c393c items=0 ppid=1341 pid=1386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.640000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 10 00:50:04.645000 audit[1388]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.645000 audit[1388]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd58a824e0 a2=0 a3=7ffd58a824cc items=0 ppid=1341 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.645000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 10 00:50:04.650000 audit[1390]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1390 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.650000 audit[1390]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd8acff330 a2=0 a3=7ffd8acff31c items=0 ppid=1341 pid=1390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.650000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:50:04.661000 audit[1394]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1394 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.661000 audit[1394]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe791c5510 a2=0 a3=7ffe791c54fc items=0 ppid=1341 pid=1394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.661000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:50:04.666000 audit[1395]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.666000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff3f63e2d0 a2=0 a3=7fff3f63e2bc items=0 ppid=1341 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.666000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:50:04.681669 kernel: Initializing XFRM netlink socket May 10 00:50:04.725203 env[1341]: time="2025-05-10T00:50:04.725110572Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 10 00:50:04.760000 audit[1403]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.760000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff42cbfa30 a2=0 a3=7fff42cbfa1c items=0 ppid=1341 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.760000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 10 00:50:04.776000 audit[1406]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.776000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffed784f800 a2=0 a3=7ffed784f7ec items=0 ppid=1341 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.776000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 10 00:50:04.783000 audit[1409]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.783000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff39da1000 a2=0 a3=7fff39da0fec items=0 ppid=1341 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.783000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 10 00:50:04.787000 audit[1411]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.787000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc9501abd0 a2=0 a3=7ffc9501abbc items=0 ppid=1341 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.787000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 10 00:50:04.792000 audit[1413]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.792000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffea6091bb0 a2=0 a3=7ffea6091b9c items=0 ppid=1341 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.792000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 10 00:50:04.796000 audit[1415]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.796000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff72115130 a2=0 a3=7fff7211511c items=0 ppid=1341 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.796000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 10 00:50:04.800000 audit[1417]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.800000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffaaf32520 a2=0 a3=7fffaaf3250c items=0 ppid=1341 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.800000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 10 00:50:04.818000 audit[1420]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.818000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fffaf38c660 a2=0 a3=7fffaf38c64c items=0 ppid=1341 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.818000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 10 00:50:04.822000 audit[1422]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.822000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc633d6a70 a2=0 a3=7ffc633d6a5c items=0 ppid=1341 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.822000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:50:04.827000 audit[1424]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.827000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffda831b2e0 a2=0 a3=7ffda831b2cc items=0 ppid=1341 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.827000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:50:04.831000 audit[1426]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.831000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff41c00470 a2=0 a3=7fff41c0045c items=0 ppid=1341 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.831000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 10 00:50:04.832492 systemd-networkd[1006]: docker0: Link UP May 10 00:50:04.843000 audit[1430]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.843000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffef6b9d00 a2=0 a3=7fffef6b9cec items=0 ppid=1341 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.843000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:50:04.849000 audit[1431]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:04.849000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc1df98bf0 a2=0 a3=7ffc1df98bdc items=0 ppid=1341 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:04.849000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:50:04.850830 env[1341]: time="2025-05-10T00:50:04.850796469Z" level=info msg="Loading containers: done." May 10 00:50:04.872750 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2627747380-merged.mount: Deactivated successfully. May 10 00:50:04.880516 env[1341]: time="2025-05-10T00:50:04.880407479Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 10 00:50:04.880933 env[1341]: time="2025-05-10T00:50:04.880853286Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 10 00:50:04.881156 env[1341]: time="2025-05-10T00:50:04.881118979Z" level=info msg="Daemon has completed initialization" May 10 00:50:04.912851 systemd[1]: Started docker.service. May 10 00:50:04.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:04.926300 env[1341]: time="2025-05-10T00:50:04.926180650Z" level=info msg="API listen on /run/docker.sock" May 10 00:50:04.958926 systemd[1]: Starting coreos-metadata.service... May 10 00:50:05.048930 coreos-metadata[1459]: May 10 00:50:05.048 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 10 00:50:05.061493 coreos-metadata[1459]: May 10 00:50:05.061 INFO Fetch successful May 10 00:50:05.078751 systemd[1]: Finished coreos-metadata.service. May 10 00:50:05.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:06.090935 env[1194]: time="2025-05-10T00:50:06.090841617Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\"" May 10 00:50:06.736760 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount846021068.mount: Deactivated successfully. May 10 00:50:08.655328 env[1194]: time="2025-05-10T00:50:08.655256897Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:08.659489 env[1194]: time="2025-05-10T00:50:08.659406979Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:08.662733 env[1194]: time="2025-05-10T00:50:08.662667406Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:08.665951 env[1194]: time="2025-05-10T00:50:08.665885149Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:631c6cc78b2862be4fed7df3384a643ef7297eebadae22e8ef9cbe2e19b6386f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:08.667447 env[1194]: time="2025-05-10T00:50:08.667376807Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\" returns image reference \"sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5\"" May 10 00:50:08.668912 env[1194]: time="2025-05-10T00:50:08.668862285Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\"" May 10 00:50:10.519706 env[1194]: time="2025-05-10T00:50:10.519608770Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:10.521404 env[1194]: time="2025-05-10T00:50:10.521350341Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:10.523887 env[1194]: time="2025-05-10T00:50:10.523832069Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:10.527011 env[1194]: time="2025-05-10T00:50:10.526950490Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:25e29187ea66f0ff9b9a00114849c3a30b649005c900a8b2a69e3f3fa56448fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:10.528180 env[1194]: time="2025-05-10T00:50:10.528076941Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\" returns image reference \"sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a\"" May 10 00:50:10.529402 env[1194]: time="2025-05-10T00:50:10.529353514Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\"" May 10 00:50:12.164834 env[1194]: time="2025-05-10T00:50:12.164752785Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:12.166548 env[1194]: time="2025-05-10T00:50:12.166499398Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:12.169122 env[1194]: time="2025-05-10T00:50:12.169051943Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:12.171951 env[1194]: time="2025-05-10T00:50:12.171885157Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09c55f8dac59a4b8e5e354140f5a4bdd6fa9bd95c42d6bcba6782ed37c31b5a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:12.172950 env[1194]: time="2025-05-10T00:50:12.172895694Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\" returns image reference \"sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000\"" May 10 00:50:12.173893 env[1194]: time="2025-05-10T00:50:12.173851797Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 10 00:50:13.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.221275 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 10 00:50:13.225742 kernel: kauditd_printk_skb: 85 callbacks suppressed May 10 00:50:13.225803 kernel: audit: type=1130 audit(1746838213.221:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.225851 kernel: audit: type=1131 audit(1746838213.221:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.221594 systemd[1]: Stopped kubelet.service. May 10 00:50:13.221700 systemd[1]: kubelet.service: Consumed 1.548s CPU time. May 10 00:50:13.224647 systemd[1]: Starting kubelet.service... May 10 00:50:13.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.365916 systemd[1]: Started kubelet.service. May 10 00:50:13.370765 kernel: audit: type=1130 audit(1746838213.365:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.463688 kubelet[1482]: E0510 00:50:13.461733 1482 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:50:13.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:50:13.466142 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:50:13.466324 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:50:13.470677 kernel: audit: type=1131 audit(1746838213.465:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:50:13.555161 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3697545293.mount: Deactivated successfully. May 10 00:50:14.481740 env[1194]: time="2025-05-10T00:50:14.481652505Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:14.483167 env[1194]: time="2025-05-10T00:50:14.483116988Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:14.485077 env[1194]: time="2025-05-10T00:50:14.485010470Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:14.486528 env[1194]: time="2025-05-10T00:50:14.486463855Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:14.487898 env[1194]: time="2025-05-10T00:50:14.487838848Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3\"" May 10 00:50:14.489018 env[1194]: time="2025-05-10T00:50:14.488980535Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 10 00:50:14.986954 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1443330863.mount: Deactivated successfully. May 10 00:50:16.108850 env[1194]: time="2025-05-10T00:50:16.108783226Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:16.110990 env[1194]: time="2025-05-10T00:50:16.110932392Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:16.113702 env[1194]: time="2025-05-10T00:50:16.113646377Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:16.115927 env[1194]: time="2025-05-10T00:50:16.115877485Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:16.117439 env[1194]: time="2025-05-10T00:50:16.117385202Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" May 10 00:50:16.118265 env[1194]: time="2025-05-10T00:50:16.118232862Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 10 00:50:16.535151 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2967533084.mount: Deactivated successfully. May 10 00:50:16.541476 env[1194]: time="2025-05-10T00:50:16.541391703Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:16.543079 env[1194]: time="2025-05-10T00:50:16.543008413Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:16.546717 env[1194]: time="2025-05-10T00:50:16.546659004Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:16.547837 env[1194]: time="2025-05-10T00:50:16.547772276Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:16.548759 env[1194]: time="2025-05-10T00:50:16.548718092Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 10 00:50:16.549690 env[1194]: time="2025-05-10T00:50:16.549640449Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 10 00:50:17.044771 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1440023603.mount: Deactivated successfully. May 10 00:50:19.577404 env[1194]: time="2025-05-10T00:50:19.577327632Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:19.579557 env[1194]: time="2025-05-10T00:50:19.579500983Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:19.581751 env[1194]: time="2025-05-10T00:50:19.581703630Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:19.584613 env[1194]: time="2025-05-10T00:50:19.584560158Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:19.585042 env[1194]: time="2025-05-10T00:50:19.585012087Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" May 10 00:50:22.654746 systemd[1]: Stopped kubelet.service. May 10 00:50:22.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:22.660779 kernel: audit: type=1130 audit(1746838222.654:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:22.660971 kernel: audit: type=1131 audit(1746838222.657:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:22.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:22.663693 systemd[1]: Starting kubelet.service... May 10 00:50:22.699573 systemd[1]: Reloading. May 10 00:50:22.837586 /usr/lib/systemd/system-generators/torcx-generator[1531]: time="2025-05-10T00:50:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:50:22.839195 /usr/lib/systemd/system-generators/torcx-generator[1531]: time="2025-05-10T00:50:22Z" level=info msg="torcx already run" May 10 00:50:22.954053 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:50:22.954079 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:50:22.977474 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:50:23.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.073669 kernel: audit: type=1400 audit(1746838223.068:261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.073809 kernel: audit: type=1400 audit(1746838223.068:262): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.073835 kernel: audit: type=1400 audit(1746838223.068:263): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.079393 kernel: audit: type=1400 audit(1746838223.068:264): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.079502 kernel: audit: type=1400 audit(1746838223.068:265): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.084407 kernel: audit: type=1400 audit(1746838223.068:266): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.084500 kernel: audit: type=1400 audit(1746838223.068:267): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.086894 kernel: audit: type=1400 audit(1746838223.068:268): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.071000 audit: BPF prog-id=40 op=LOAD May 10 00:50:23.071000 audit: BPF prog-id=24 op=UNLOAD May 10 00:50:23.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.076000 audit: BPF prog-id=41 op=LOAD May 10 00:50:23.076000 audit: BPF prog-id=25 op=UNLOAD May 10 00:50:23.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.081000 audit: BPF prog-id=42 op=LOAD May 10 00:50:23.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.089000 audit: BPF prog-id=43 op=LOAD May 10 00:50:23.090000 audit: BPF prog-id=26 op=UNLOAD May 10 00:50:23.090000 audit: BPF prog-id=27 op=UNLOAD May 10 00:50:23.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.092000 audit: BPF prog-id=44 op=LOAD May 10 00:50:23.093000 audit: BPF prog-id=28 op=UNLOAD May 10 00:50:23.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.093000 audit: BPF prog-id=45 op=LOAD May 10 00:50:23.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.094000 audit: BPF prog-id=46 op=LOAD May 10 00:50:23.094000 audit: BPF prog-id=29 op=UNLOAD May 10 00:50:23.094000 audit: BPF prog-id=30 op=UNLOAD May 10 00:50:23.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.096000 audit: BPF prog-id=47 op=LOAD May 10 00:50:23.096000 audit: BPF prog-id=34 op=UNLOAD May 10 00:50:23.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.097000 audit: BPF prog-id=48 op=LOAD May 10 00:50:23.097000 audit: BPF prog-id=38 op=UNLOAD May 10 00:50:23.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.098000 audit: BPF prog-id=49 op=LOAD May 10 00:50:23.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.099000 audit: BPF prog-id=50 op=LOAD May 10 00:50:23.099000 audit: BPF prog-id=31 op=UNLOAD May 10 00:50:23.099000 audit: BPF prog-id=32 op=UNLOAD May 10 00:50:23.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.101000 audit: BPF prog-id=51 op=LOAD May 10 00:50:23.101000 audit: BPF prog-id=35 op=UNLOAD May 10 00:50:23.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.102000 audit: BPF prog-id=52 op=LOAD May 10 00:50:23.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.103000 audit: BPF prog-id=53 op=LOAD May 10 00:50:23.103000 audit: BPF prog-id=36 op=UNLOAD May 10 00:50:23.103000 audit: BPF prog-id=37 op=UNLOAD May 10 00:50:23.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.104000 audit: BPF prog-id=54 op=LOAD May 10 00:50:23.104000 audit: BPF prog-id=33 op=UNLOAD May 10 00:50:23.126592 systemd[1]: Started kubelet.service. May 10 00:50:23.128415 systemd[1]: Stopping kubelet.service... May 10 00:50:23.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:23.128741 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:50:23.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:23.129095 systemd[1]: Stopped kubelet.service. May 10 00:50:23.131089 systemd[1]: Starting kubelet.service... May 10 00:50:23.288524 systemd[1]: Started kubelet.service. May 10 00:50:23.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:23.362123 kubelet[1585]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:50:23.362123 kubelet[1585]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 10 00:50:23.362123 kubelet[1585]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:50:23.362842 kubelet[1585]: I0510 00:50:23.362363 1585 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:50:23.962724 kubelet[1585]: I0510 00:50:23.962665 1585 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 10 00:50:23.962724 kubelet[1585]: I0510 00:50:23.962715 1585 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:50:23.963284 kubelet[1585]: I0510 00:50:23.963255 1585 server.go:954] "Client rotation is on, will bootstrap in background" May 10 00:50:24.022931 kubelet[1585]: E0510 00:50:24.022878 1585 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://146.190.154.235:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 146.190.154.235:6443: connect: connection refused" logger="UnhandledError" May 10 00:50:24.024423 kubelet[1585]: I0510 00:50:24.024382 1585 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:50:24.039686 kubelet[1585]: E0510 00:50:24.039613 1585 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 10 00:50:24.039686 kubelet[1585]: I0510 00:50:24.039676 1585 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 10 00:50:24.045035 kubelet[1585]: I0510 00:50:24.044953 1585 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:50:24.045436 kubelet[1585]: I0510 00:50:24.045367 1585 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:50:24.045731 kubelet[1585]: I0510 00:50:24.045432 1585 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-09020fac35","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 10 00:50:24.045898 kubelet[1585]: I0510 00:50:24.045741 1585 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:50:24.045898 kubelet[1585]: I0510 00:50:24.045759 1585 container_manager_linux.go:304] "Creating device plugin manager" May 10 00:50:24.046027 kubelet[1585]: I0510 00:50:24.045920 1585 state_mem.go:36] "Initialized new in-memory state store" May 10 00:50:24.052434 kubelet[1585]: I0510 00:50:24.052362 1585 kubelet.go:446] "Attempting to sync node with API server" May 10 00:50:24.052434 kubelet[1585]: I0510 00:50:24.052424 1585 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:50:24.052723 kubelet[1585]: I0510 00:50:24.052460 1585 kubelet.go:352] "Adding apiserver pod source" May 10 00:50:24.052723 kubelet[1585]: I0510 00:50:24.052473 1585 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:50:24.063177 kubelet[1585]: W0510 00:50:24.063050 1585 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://146.190.154.235:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-09020fac35&limit=500&resourceVersion=0": dial tcp 146.190.154.235:6443: connect: connection refused May 10 00:50:24.063392 kubelet[1585]: E0510 00:50:24.063203 1585 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://146.190.154.235:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-09020fac35&limit=500&resourceVersion=0\": dial tcp 146.190.154.235:6443: connect: connection refused" logger="UnhandledError" May 10 00:50:24.063392 kubelet[1585]: I0510 00:50:24.063357 1585 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:50:24.064219 kubelet[1585]: I0510 00:50:24.064178 1585 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:50:24.065194 kubelet[1585]: W0510 00:50:24.065159 1585 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 10 00:50:24.074109 kubelet[1585]: I0510 00:50:24.073043 1585 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 10 00:50:24.074323 kubelet[1585]: I0510 00:50:24.074164 1585 server.go:1287] "Started kubelet" May 10 00:50:24.095012 kubelet[1585]: W0510 00:50:24.094929 1585 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://146.190.154.235:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 146.190.154.235:6443: connect: connection refused May 10 00:50:24.095325 kubelet[1585]: E0510 00:50:24.095270 1585 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://146.190.154.235:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 146.190.154.235:6443: connect: connection refused" logger="UnhandledError" May 10 00:50:24.095000 audit[1585]: AVC avc: denied { mac_admin } for pid=1585 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.095000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:50:24.095000 audit[1585]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00094ade0 a1=c00090a9d8 a2=c00094adb0 a3=25 items=0 ppid=1 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:24.095000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:50:24.095000 audit[1585]: AVC avc: denied { mac_admin } for pid=1585 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.095000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:50:24.095000 audit[1585]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00073fc00 a1=c00090a9f0 a2=c00094ae70 a3=25 items=0 ppid=1 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:24.095000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:50:24.097725 kubelet[1585]: I0510 00:50:24.096450 1585 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:50:24.097725 kubelet[1585]: I0510 00:50:24.096517 1585 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 10 00:50:24.097725 kubelet[1585]: I0510 00:50:24.096612 1585 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:50:24.098091 kubelet[1585]: E0510 00:50:24.095584 1585 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://146.190.154.235:6443/api/v1/namespaces/default/events\": dial tcp 146.190.154.235:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.7-n-09020fac35.183e041c1202ba7a default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-09020fac35,UID:ci-3510.3.7-n-09020fac35,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-09020fac35,},FirstTimestamp:2025-05-10 00:50:24.074095226 +0000 UTC m=+0.777800601,LastTimestamp:2025-05-10 00:50:24.074095226 +0000 UTC m=+0.777800601,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-09020fac35,}" May 10 00:50:24.100283 kubelet[1585]: I0510 00:50:24.100220 1585 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:50:24.101307 kubelet[1585]: I0510 00:50:24.101222 1585 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:50:24.101796 kubelet[1585]: I0510 00:50:24.101769 1585 server.go:490] "Adding debug handlers to kubelet server" May 10 00:50:24.102057 kubelet[1585]: I0510 00:50:24.102032 1585 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:50:24.102674 kubelet[1585]: I0510 00:50:24.102646 1585 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 10 00:50:24.103063 kubelet[1585]: I0510 00:50:24.103036 1585 volume_manager.go:297] "Starting Kubelet Volume Manager" May 10 00:50:24.103381 kubelet[1585]: E0510 00:50:24.103354 1585 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-09020fac35\" not found" May 10 00:50:24.106408 kubelet[1585]: E0510 00:50:24.106328 1585 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://146.190.154.235:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-09020fac35?timeout=10s\": dial tcp 146.190.154.235:6443: connect: connection refused" interval="200ms" May 10 00:50:24.106820 kubelet[1585]: I0510 00:50:24.106781 1585 reconciler.go:26] "Reconciler: start to sync state" May 10 00:50:24.107019 kubelet[1585]: I0510 00:50:24.106984 1585 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:50:24.107910 kubelet[1585]: W0510 00:50:24.107848 1585 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://146.190.154.235:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 146.190.154.235:6443: connect: connection refused May 10 00:50:24.108059 kubelet[1585]: E0510 00:50:24.108033 1585 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://146.190.154.235:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 146.190.154.235:6443: connect: connection refused" logger="UnhandledError" May 10 00:50:24.107000 audit[1597]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1597 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:24.107000 audit[1597]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc8acc9500 a2=0 a3=7ffc8acc94ec items=0 ppid=1585 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:24.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:50:24.109000 audit[1598]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1598 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:24.109000 audit[1598]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff859f04a0 a2=0 a3=7fff859f048c items=0 ppid=1585 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:24.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:50:24.111886 kubelet[1585]: I0510 00:50:24.111851 1585 factory.go:221] Registration of the containerd container factory successfully May 10 00:50:24.112039 kubelet[1585]: I0510 00:50:24.112023 1585 factory.go:221] Registration of the systemd container factory successfully May 10 00:50:24.112276 kubelet[1585]: I0510 00:50:24.112246 1585 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:50:24.113000 audit[1600]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1600 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:24.113000 audit[1600]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff0f49f200 a2=0 a3=7fff0f49f1ec items=0 ppid=1585 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:24.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:50:24.116000 audit[1602]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1602 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:24.116000 audit[1602]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc8bae47c0 a2=0 a3=7ffc8bae47ac items=0 ppid=1585 pid=1602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:24.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:50:24.122098 kubelet[1585]: E0510 00:50:24.122045 1585 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:50:24.131000 audit[1605]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1605 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:24.131000 audit[1605]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd2404c0f0 a2=0 a3=7ffd2404c0dc items=0 ppid=1585 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:24.131000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 10 00:50:24.133305 kubelet[1585]: I0510 00:50:24.132595 1585 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:50:24.133000 audit[1606]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1606 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:24.133000 audit[1606]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd64d22f60 a2=0 a3=7ffd64d22f4c items=0 ppid=1585 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:24.133000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:50:24.135447 kubelet[1585]: I0510 00:50:24.134656 1585 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:50:24.135447 kubelet[1585]: I0510 00:50:24.134701 1585 status_manager.go:227] "Starting to sync pod status with apiserver" May 10 00:50:24.135447 kubelet[1585]: I0510 00:50:24.134748 1585 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 10 00:50:24.135447 kubelet[1585]: I0510 00:50:24.134760 1585 kubelet.go:2388] "Starting kubelet main sync loop" May 10 00:50:24.135447 kubelet[1585]: E0510 00:50:24.134848 1585 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:50:24.136000 audit[1607]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1607 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:24.136000 audit[1607]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec4456240 a2=0 a3=7ffec445622c items=0 ppid=1585 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:24.136000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:50:24.139000 audit[1609]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1609 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:24.139000 audit[1609]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd520092e0 a2=0 a3=7ffd520092cc items=0 ppid=1585 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:24.139000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:50:24.141000 audit[1610]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1610 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:24.141000 audit[1610]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd73f98130 a2=0 a3=7ffd73f9811c items=0 ppid=1585 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:24.141000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:50:24.150484 kubelet[1585]: W0510 00:50:24.150403 1585 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://146.190.154.235:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 146.190.154.235:6443: connect: connection refused May 10 00:50:24.151395 kubelet[1585]: E0510 00:50:24.151258 1585 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://146.190.154.235:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 146.190.154.235:6443: connect: connection refused" logger="UnhandledError" May 10 00:50:24.151924 kubelet[1585]: I0510 00:50:24.151899 1585 cpu_manager.go:221] "Starting CPU manager" policy="none" May 10 00:50:24.152119 kubelet[1585]: I0510 00:50:24.152035 1585 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 10 00:50:24.152119 kubelet[1585]: I0510 00:50:24.152118 1585 state_mem.go:36] "Initialized new in-memory state store" May 10 00:50:24.152000 audit[1612]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1612 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:24.152000 audit[1612]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf8b010e0 a2=0 a3=7ffcf8b010cc items=0 ppid=1585 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:24.152000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:50:24.154122 kubelet[1585]: I0510 00:50:24.154091 1585 policy_none.go:49] "None policy: Start" May 10 00:50:24.154215 kubelet[1585]: I0510 00:50:24.154127 1585 memory_manager.go:186] "Starting memorymanager" policy="None" May 10 00:50:24.154215 kubelet[1585]: I0510 00:50:24.154159 1585 state_mem.go:35] "Initializing new in-memory state store" May 10 00:50:24.155000 audit[1614]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1614 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:24.155000 audit[1614]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc2d0ed360 a2=0 a3=7ffc2d0ed34c items=0 ppid=1585 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:24.155000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:50:24.163017 systemd[1]: Created slice kubepods.slice. May 10 00:50:24.166000 audit[1615]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1615 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:24.166000 audit[1615]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc35d9be40 a2=0 a3=7ffc35d9be2c items=0 ppid=1585 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:24.166000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:50:24.170562 systemd[1]: Created slice kubepods-burstable.slice. May 10 00:50:24.174734 systemd[1]: Created slice kubepods-besteffort.slice. May 10 00:50:24.181993 kubelet[1585]: I0510 00:50:24.181948 1585 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:50:24.181000 audit[1585]: AVC avc: denied { mac_admin } for pid=1585 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.181000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:50:24.181000 audit[1585]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009f5d10 a1=c000dc8bd0 a2=c0009f5ce0 a3=25 items=0 ppid=1 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:24.181000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:50:24.184764 kubelet[1585]: I0510 00:50:24.184730 1585 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:50:24.185757 kubelet[1585]: I0510 00:50:24.185733 1585 eviction_manager.go:189] "Eviction manager: starting control loop" May 10 00:50:24.186166 kubelet[1585]: I0510 00:50:24.186118 1585 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:50:24.187350 kubelet[1585]: I0510 00:50:24.187316 1585 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:50:24.188028 kubelet[1585]: E0510 00:50:24.187736 1585 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 10 00:50:24.188205 kubelet[1585]: E0510 00:50:24.188183 1585 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.7-n-09020fac35\" not found" May 10 00:50:24.246360 systemd[1]: Created slice kubepods-burstable-pod8e722b4f4b0782b602edb72bf5921f00.slice. May 10 00:50:24.253995 kubelet[1585]: E0510 00:50:24.253958 1585 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-09020fac35\" not found" node="ci-3510.3.7-n-09020fac35" May 10 00:50:24.256526 systemd[1]: Created slice kubepods-burstable-podbc938eae5374897d3b7cf5fe34694d39.slice. May 10 00:50:24.259360 kubelet[1585]: E0510 00:50:24.259327 1585 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-09020fac35\" not found" node="ci-3510.3.7-n-09020fac35" May 10 00:50:24.262352 systemd[1]: Created slice kubepods-burstable-pod7ea8e49d13bdf79c1f28fef65c985330.slice. May 10 00:50:24.264990 kubelet[1585]: E0510 00:50:24.264948 1585 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-09020fac35\" not found" node="ci-3510.3.7-n-09020fac35" May 10 00:50:24.288722 kubelet[1585]: I0510 00:50:24.288676 1585 kubelet_node_status.go:76] "Attempting to register node" node="ci-3510.3.7-n-09020fac35" May 10 00:50:24.289605 kubelet[1585]: E0510 00:50:24.289561 1585 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://146.190.154.235:6443/api/v1/nodes\": dial tcp 146.190.154.235:6443: connect: connection refused" node="ci-3510.3.7-n-09020fac35" May 10 00:50:24.307745 kubelet[1585]: E0510 00:50:24.307693 1585 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://146.190.154.235:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-09020fac35?timeout=10s\": dial tcp 146.190.154.235:6443: connect: connection refused" interval="400ms" May 10 00:50:24.307996 kubelet[1585]: I0510 00:50:24.307970 1585 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/bc938eae5374897d3b7cf5fe34694d39-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-09020fac35\" (UID: \"bc938eae5374897d3b7cf5fe34694d39\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-09020fac35" May 10 00:50:24.308272 kubelet[1585]: I0510 00:50:24.308209 1585 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/bc938eae5374897d3b7cf5fe34694d39-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-09020fac35\" (UID: \"bc938eae5374897d3b7cf5fe34694d39\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-09020fac35" May 10 00:50:24.308404 kubelet[1585]: I0510 00:50:24.308387 1585 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/bc938eae5374897d3b7cf5fe34694d39-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-09020fac35\" (UID: \"bc938eae5374897d3b7cf5fe34694d39\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-09020fac35" May 10 00:50:24.308524 kubelet[1585]: I0510 00:50:24.308506 1585 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8e722b4f4b0782b602edb72bf5921f00-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-09020fac35\" (UID: \"8e722b4f4b0782b602edb72bf5921f00\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-09020fac35" May 10 00:50:24.308665 kubelet[1585]: I0510 00:50:24.308650 1585 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8e722b4f4b0782b602edb72bf5921f00-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-09020fac35\" (UID: \"8e722b4f4b0782b602edb72bf5921f00\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-09020fac35" May 10 00:50:24.308792 kubelet[1585]: I0510 00:50:24.308776 1585 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/bc938eae5374897d3b7cf5fe34694d39-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-09020fac35\" (UID: \"bc938eae5374897d3b7cf5fe34694d39\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-09020fac35" May 10 00:50:24.308914 kubelet[1585]: I0510 00:50:24.308899 1585 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7ea8e49d13bdf79c1f28fef65c985330-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-09020fac35\" (UID: \"7ea8e49d13bdf79c1f28fef65c985330\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-09020fac35" May 10 00:50:24.309055 kubelet[1585]: I0510 00:50:24.309039 1585 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8e722b4f4b0782b602edb72bf5921f00-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-09020fac35\" (UID: \"8e722b4f4b0782b602edb72bf5921f00\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-09020fac35" May 10 00:50:24.309193 kubelet[1585]: I0510 00:50:24.309176 1585 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/bc938eae5374897d3b7cf5fe34694d39-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-09020fac35\" (UID: \"bc938eae5374897d3b7cf5fe34694d39\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-09020fac35" May 10 00:50:24.491217 kubelet[1585]: I0510 00:50:24.491182 1585 kubelet_node_status.go:76] "Attempting to register node" node="ci-3510.3.7-n-09020fac35" May 10 00:50:24.492341 kubelet[1585]: E0510 00:50:24.492289 1585 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://146.190.154.235:6443/api/v1/nodes\": dial tcp 146.190.154.235:6443: connect: connection refused" node="ci-3510.3.7-n-09020fac35" May 10 00:50:24.554847 kubelet[1585]: E0510 00:50:24.554681 1585 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:24.556575 env[1194]: time="2025-05-10T00:50:24.556513205Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-09020fac35,Uid:8e722b4f4b0782b602edb72bf5921f00,Namespace:kube-system,Attempt:0,}" May 10 00:50:24.560457 kubelet[1585]: E0510 00:50:24.560396 1585 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:24.561880 env[1194]: time="2025-05-10T00:50:24.561153184Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-09020fac35,Uid:bc938eae5374897d3b7cf5fe34694d39,Namespace:kube-system,Attempt:0,}" May 10 00:50:24.566509 kubelet[1585]: E0510 00:50:24.566462 1585 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:24.567588 env[1194]: time="2025-05-10T00:50:24.567180200Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-09020fac35,Uid:7ea8e49d13bdf79c1f28fef65c985330,Namespace:kube-system,Attempt:0,}" May 10 00:50:24.708459 kubelet[1585]: E0510 00:50:24.708400 1585 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://146.190.154.235:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-09020fac35?timeout=10s\": dial tcp 146.190.154.235:6443: connect: connection refused" interval="800ms" May 10 00:50:24.893826 kubelet[1585]: I0510 00:50:24.893702 1585 kubelet_node_status.go:76] "Attempting to register node" node="ci-3510.3.7-n-09020fac35" May 10 00:50:24.894342 kubelet[1585]: E0510 00:50:24.894286 1585 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://146.190.154.235:6443/api/v1/nodes\": dial tcp 146.190.154.235:6443: connect: connection refused" node="ci-3510.3.7-n-09020fac35" May 10 00:50:24.940046 kubelet[1585]: W0510 00:50:24.939924 1585 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://146.190.154.235:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 146.190.154.235:6443: connect: connection refused May 10 00:50:24.940046 kubelet[1585]: E0510 00:50:24.939997 1585 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://146.190.154.235:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 146.190.154.235:6443: connect: connection refused" logger="UnhandledError" May 10 00:50:24.993126 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1847422269.mount: Deactivated successfully. May 10 00:50:24.998678 env[1194]: time="2025-05-10T00:50:24.998587019Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:25.001263 env[1194]: time="2025-05-10T00:50:25.001148417Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:25.003037 env[1194]: time="2025-05-10T00:50:25.002965574Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:25.005106 env[1194]: time="2025-05-10T00:50:25.005037521Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:25.010985 env[1194]: time="2025-05-10T00:50:25.010132078Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:25.013991 env[1194]: time="2025-05-10T00:50:25.013927665Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:25.018607 env[1194]: time="2025-05-10T00:50:25.018527305Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:25.019284 env[1194]: time="2025-05-10T00:50:25.019234186Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:25.020389 env[1194]: time="2025-05-10T00:50:25.020338388Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:25.021390 env[1194]: time="2025-05-10T00:50:25.021343052Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:25.022449 env[1194]: time="2025-05-10T00:50:25.022400353Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:25.023808 env[1194]: time="2025-05-10T00:50:25.023770132Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:25.058827 env[1194]: time="2025-05-10T00:50:25.058721409Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:25.058997 env[1194]: time="2025-05-10T00:50:25.058791910Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:25.058997 env[1194]: time="2025-05-10T00:50:25.058808749Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:25.059094 env[1194]: time="2025-05-10T00:50:25.059056796Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1dcf68772dc69fbac2cef6903498cdcd6cce4cfdd31e10022cc492262e2b5f50 pid=1626 runtime=io.containerd.runc.v2 May 10 00:50:25.065579 env[1194]: time="2025-05-10T00:50:25.065422877Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:25.065999 env[1194]: time="2025-05-10T00:50:25.065957350Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:25.066185 env[1194]: time="2025-05-10T00:50:25.066137967Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:25.066878 env[1194]: time="2025-05-10T00:50:25.066815969Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/28adc6c5ed340e484f48db22fc7a0bcbf80e30e5c7c033057b2ed65dc5b94357 pid=1642 runtime=io.containerd.runc.v2 May 10 00:50:25.073714 env[1194]: time="2025-05-10T00:50:25.073600641Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:25.073714 env[1194]: time="2025-05-10T00:50:25.073661250Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:25.073946 env[1194]: time="2025-05-10T00:50:25.073672546Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:25.074177 env[1194]: time="2025-05-10T00:50:25.074127715Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/156cd87a649fd61dfbae24aadcca576915209199587aa24c0b72430ecafe6071 pid=1647 runtime=io.containerd.runc.v2 May 10 00:50:25.093012 systemd[1]: Started cri-containerd-1dcf68772dc69fbac2cef6903498cdcd6cce4cfdd31e10022cc492262e2b5f50.scope. May 10 00:50:25.097925 systemd[1]: Started cri-containerd-28adc6c5ed340e484f48db22fc7a0bcbf80e30e5c7c033057b2ed65dc5b94357.scope. May 10 00:50:25.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.125000 audit: BPF prog-id=55 op=LOAD May 10 00:50:25.127000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1626 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164636636383737326463363966626163326365663639303334393863 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1626 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164636636383737326463363966626163326365663639303334393863 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit: BPF prog-id=56 op=LOAD May 10 00:50:25.127000 audit[1659]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003940b0 items=0 ppid=1626 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164636636383737326463363966626163326365663639303334393863 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit: BPF prog-id=57 op=LOAD May 10 00:50:25.127000 audit[1659]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003940f8 items=0 ppid=1626 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164636636383737326463363966626163326365663639303334393863 May 10 00:50:25.127000 audit: BPF prog-id=57 op=UNLOAD May 10 00:50:25.127000 audit: BPF prog-id=56 op=UNLOAD May 10 00:50:25.127000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.127000 audit: BPF prog-id=58 op=LOAD May 10 00:50:25.127000 audit[1659]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000394508 items=0 ppid=1626 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164636636383737326463363966626163326365663639303334393863 May 10 00:50:25.141066 systemd[1]: Started cri-containerd-156cd87a649fd61dfbae24aadcca576915209199587aa24c0b72430ecafe6071.scope. May 10 00:50:25.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.146000 audit: BPF prog-id=59 op=LOAD May 10 00:50:25.147000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.147000 audit[1670]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1642 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238616463366335656433343065343834663438646232326663376130 May 10 00:50:25.147000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.147000 audit[1670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1642 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238616463366335656433343065343834663438646232326663376130 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit: BPF prog-id=60 op=LOAD May 10 00:50:25.148000 audit[1670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002134d0 items=0 ppid=1642 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238616463366335656433343065343834663438646232326663376130 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit: BPF prog-id=61 op=LOAD May 10 00:50:25.148000 audit[1670]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000213518 items=0 ppid=1642 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238616463366335656433343065343834663438646232326663376130 May 10 00:50:25.148000 audit: BPF prog-id=61 op=UNLOAD May 10 00:50:25.148000 audit: BPF prog-id=60 op=UNLOAD May 10 00:50:25.148000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.148000 audit: BPF prog-id=62 op=LOAD May 10 00:50:25.148000 audit[1670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000213928 items=0 ppid=1642 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238616463366335656433343065343834663438646232326663376130 May 10 00:50:25.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.172000 audit: BPF prog-id=63 op=LOAD May 10 00:50:25.173000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.173000 audit[1675]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1647 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135366364383761363439666436316466626165323461616463636135 May 10 00:50:25.173000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.173000 audit[1675]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1647 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135366364383761363439666436316466626165323461616463636135 May 10 00:50:25.174000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.174000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.174000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.174000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.174000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.174000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.174000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.174000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.174000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.174000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.174000 audit: BPF prog-id=64 op=LOAD May 10 00:50:25.174000 audit[1675]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003585b0 items=0 ppid=1647 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135366364383761363439666436316466626165323461616463636135 May 10 00:50:25.174000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.174000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.174000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.174000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.174000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.174000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.174000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.174000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.174000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.174000 audit: BPF prog-id=65 op=LOAD May 10 00:50:25.174000 audit[1675]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003585f8 items=0 ppid=1647 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135366364383761363439666436316466626165323461616463636135 May 10 00:50:25.175000 audit: BPF prog-id=65 op=UNLOAD May 10 00:50:25.175000 audit: BPF prog-id=64 op=UNLOAD May 10 00:50:25.175000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.175000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.175000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.175000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.175000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.175000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.175000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.175000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.175000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.175000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.175000 audit: BPF prog-id=66 op=LOAD May 10 00:50:25.175000 audit[1675]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000358a08 items=0 ppid=1647 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135366364383761363439666436316466626165323461616463636135 May 10 00:50:25.204728 env[1194]: time="2025-05-10T00:50:25.204609307Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-09020fac35,Uid:8e722b4f4b0782b602edb72bf5921f00,Namespace:kube-system,Attempt:0,} returns sandbox id \"1dcf68772dc69fbac2cef6903498cdcd6cce4cfdd31e10022cc492262e2b5f50\"" May 10 00:50:25.208271 kubelet[1585]: E0510 00:50:25.207066 1585 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:25.218414 env[1194]: time="2025-05-10T00:50:25.218355776Z" level=info msg="CreateContainer within sandbox \"1dcf68772dc69fbac2cef6903498cdcd6cce4cfdd31e10022cc492262e2b5f50\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 10 00:50:25.237538 env[1194]: time="2025-05-10T00:50:25.237489507Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-09020fac35,Uid:7ea8e49d13bdf79c1f28fef65c985330,Namespace:kube-system,Attempt:0,} returns sandbox id \"28adc6c5ed340e484f48db22fc7a0bcbf80e30e5c7c033057b2ed65dc5b94357\"" May 10 00:50:25.238796 kubelet[1585]: E0510 00:50:25.238747 1585 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:25.241710 env[1194]: time="2025-05-10T00:50:25.241615553Z" level=info msg="CreateContainer within sandbox \"28adc6c5ed340e484f48db22fc7a0bcbf80e30e5c7c033057b2ed65dc5b94357\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 10 00:50:25.242066 env[1194]: time="2025-05-10T00:50:25.242023235Z" level=info msg="CreateContainer within sandbox \"1dcf68772dc69fbac2cef6903498cdcd6cce4cfdd31e10022cc492262e2b5f50\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"51e064e4c6d234578f70c10f12ceab9db1c8476d41b68f2d1e8aa37b3b7c5754\"" May 10 00:50:25.249366 env[1194]: time="2025-05-10T00:50:25.249302814Z" level=info msg="StartContainer for \"51e064e4c6d234578f70c10f12ceab9db1c8476d41b68f2d1e8aa37b3b7c5754\"" May 10 00:50:25.252746 env[1194]: time="2025-05-10T00:50:25.252669140Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-09020fac35,Uid:bc938eae5374897d3b7cf5fe34694d39,Namespace:kube-system,Attempt:0,} returns sandbox id \"156cd87a649fd61dfbae24aadcca576915209199587aa24c0b72430ecafe6071\"" May 10 00:50:25.253960 kubelet[1585]: E0510 00:50:25.253883 1585 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:25.256166 env[1194]: time="2025-05-10T00:50:25.256102629Z" level=info msg="CreateContainer within sandbox \"156cd87a649fd61dfbae24aadcca576915209199587aa24c0b72430ecafe6071\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 10 00:50:25.260221 env[1194]: time="2025-05-10T00:50:25.260151060Z" level=info msg="CreateContainer within sandbox \"28adc6c5ed340e484f48db22fc7a0bcbf80e30e5c7c033057b2ed65dc5b94357\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"c65242a253bbf8e4ffeaa0426f66d48adfba3038921058691d6ca2b4d69c95b8\"" May 10 00:50:25.264869 env[1194]: time="2025-05-10T00:50:25.264816791Z" level=info msg="StartContainer for \"c65242a253bbf8e4ffeaa0426f66d48adfba3038921058691d6ca2b4d69c95b8\"" May 10 00:50:25.275833 env[1194]: time="2025-05-10T00:50:25.275782308Z" level=info msg="CreateContainer within sandbox \"156cd87a649fd61dfbae24aadcca576915209199587aa24c0b72430ecafe6071\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"0a106476a4c9b91d1175e367e8be8384750b5947eec2f52cd7a952623bd87f31\"" May 10 00:50:25.276794 env[1194]: time="2025-05-10T00:50:25.276748960Z" level=info msg="StartContainer for \"0a106476a4c9b91d1175e367e8be8384750b5947eec2f52cd7a952623bd87f31\"" May 10 00:50:25.289680 systemd[1]: Started cri-containerd-51e064e4c6d234578f70c10f12ceab9db1c8476d41b68f2d1e8aa37b3b7c5754.scope. May 10 00:50:25.307460 kubelet[1585]: W0510 00:50:25.307380 1585 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://146.190.154.235:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 146.190.154.235:6443: connect: connection refused May 10 00:50:25.307643 kubelet[1585]: E0510 00:50:25.307474 1585 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://146.190.154.235:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 146.190.154.235:6443: connect: connection refused" logger="UnhandledError" May 10 00:50:25.319807 systemd[1]: Started cri-containerd-0a106476a4c9b91d1175e367e8be8384750b5947eec2f52cd7a952623bd87f31.scope. May 10 00:50:25.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit: BPF prog-id=67 op=LOAD May 10 00:50:25.325000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1626 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531653036346534633664323334353738663730633130663132636561 May 10 00:50:25.325000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1626 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531653036346534633664323334353738663730633130663132636561 May 10 00:50:25.325000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.325000 audit: BPF prog-id=68 op=LOAD May 10 00:50:25.325000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001cca20 items=0 ppid=1626 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531653036346534633664323334353738663730633130663132636561 May 10 00:50:25.326000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.326000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.326000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.326000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.326000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.326000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.326000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.326000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.326000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.326000 audit: BPF prog-id=69 op=LOAD May 10 00:50:25.326000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001cca68 items=0 ppid=1626 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531653036346534633664323334353738663730633130663132636561 May 10 00:50:25.326000 audit: BPF prog-id=69 op=UNLOAD May 10 00:50:25.326000 audit: BPF prog-id=68 op=UNLOAD May 10 00:50:25.326000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.326000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.326000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.326000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.326000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.326000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.326000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.326000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.326000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.326000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.326000 audit: BPF prog-id=70 op=LOAD May 10 00:50:25.326000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001cce78 items=0 ppid=1626 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531653036346534633664323334353738663730633130663132636561 May 10 00:50:25.337681 systemd[1]: Started cri-containerd-c65242a253bbf8e4ffeaa0426f66d48adfba3038921058691d6ca2b4d69c95b8.scope. May 10 00:50:25.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit: BPF prog-id=71 op=LOAD May 10 00:50:25.364000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1647 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061313036343736613463396239316431313735653336376538626538 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1647 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061313036343736613463396239316431313735653336376538626538 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit: BPF prog-id=72 op=LOAD May 10 00:50:25.364000 audit[1782]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dbc80 items=0 ppid=1647 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061313036343736613463396239316431313735653336376538626538 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit: BPF prog-id=73 op=LOAD May 10 00:50:25.364000 audit[1782]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dbcc8 items=0 ppid=1647 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061313036343736613463396239316431313735653336376538626538 May 10 00:50:25.364000 audit: BPF prog-id=73 op=UNLOAD May 10 00:50:25.364000 audit: BPF prog-id=72 op=UNLOAD May 10 00:50:25.364000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.364000 audit: BPF prog-id=74 op=LOAD May 10 00:50:25.364000 audit[1782]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003260d8 items=0 ppid=1647 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061313036343736613463396239316431313735653336376538626538 May 10 00:50:25.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.393000 audit: BPF prog-id=75 op=LOAD May 10 00:50:25.394000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1642 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336353234326132353362626638653466666561613034323666363664 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1642 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336353234326132353362626638653466666561613034323666363664 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit: BPF prog-id=76 op=LOAD May 10 00:50:25.394000 audit[1763]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00027bdc0 items=0 ppid=1642 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336353234326132353362626638653466666561613034323666363664 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit: BPF prog-id=77 op=LOAD May 10 00:50:25.394000 audit[1763]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00027be08 items=0 ppid=1642 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336353234326132353362626638653466666561613034323666363664 May 10 00:50:25.394000 audit: BPF prog-id=77 op=UNLOAD May 10 00:50:25.394000 audit: BPF prog-id=76 op=UNLOAD May 10 00:50:25.394000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:25.394000 audit: BPF prog-id=78 op=LOAD May 10 00:50:25.394000 audit[1763]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000376218 items=0 ppid=1642 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:25.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336353234326132353362626638653466666561613034323666363664 May 10 00:50:25.403297 env[1194]: time="2025-05-10T00:50:25.403177011Z" level=info msg="StartContainer for \"51e064e4c6d234578f70c10f12ceab9db1c8476d41b68f2d1e8aa37b3b7c5754\" returns successfully" May 10 00:50:25.418886 kubelet[1585]: W0510 00:50:25.418819 1585 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://146.190.154.235:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-09020fac35&limit=500&resourceVersion=0": dial tcp 146.190.154.235:6443: connect: connection refused May 10 00:50:25.419041 kubelet[1585]: E0510 00:50:25.418905 1585 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://146.190.154.235:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-09020fac35&limit=500&resourceVersion=0\": dial tcp 146.190.154.235:6443: connect: connection refused" logger="UnhandledError" May 10 00:50:25.428842 env[1194]: time="2025-05-10T00:50:25.428775021Z" level=info msg="StartContainer for \"0a106476a4c9b91d1175e367e8be8384750b5947eec2f52cd7a952623bd87f31\" returns successfully" May 10 00:50:25.454581 env[1194]: time="2025-05-10T00:50:25.454516828Z" level=info msg="StartContainer for \"c65242a253bbf8e4ffeaa0426f66d48adfba3038921058691d6ca2b4d69c95b8\" returns successfully" May 10 00:50:25.510090 kubelet[1585]: E0510 00:50:25.510029 1585 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://146.190.154.235:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-09020fac35?timeout=10s\": dial tcp 146.190.154.235:6443: connect: connection refused" interval="1.6s" May 10 00:50:25.653501 kubelet[1585]: W0510 00:50:25.653328 1585 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://146.190.154.235:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 146.190.154.235:6443: connect: connection refused May 10 00:50:25.653501 kubelet[1585]: E0510 00:50:25.653427 1585 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://146.190.154.235:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 146.190.154.235:6443: connect: connection refused" logger="UnhandledError" May 10 00:50:25.696282 kubelet[1585]: I0510 00:50:25.696229 1585 kubelet_node_status.go:76] "Attempting to register node" node="ci-3510.3.7-n-09020fac35" May 10 00:50:25.696764 kubelet[1585]: E0510 00:50:25.696715 1585 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://146.190.154.235:6443/api/v1/nodes\": dial tcp 146.190.154.235:6443: connect: connection refused" node="ci-3510.3.7-n-09020fac35" May 10 00:50:26.160302 kubelet[1585]: E0510 00:50:26.160269 1585 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-09020fac35\" not found" node="ci-3510.3.7-n-09020fac35" May 10 00:50:26.160685 kubelet[1585]: E0510 00:50:26.160668 1585 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:26.164309 kubelet[1585]: E0510 00:50:26.164277 1585 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-09020fac35\" not found" node="ci-3510.3.7-n-09020fac35" May 10 00:50:26.164816 kubelet[1585]: E0510 00:50:26.164797 1585 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:26.166688 kubelet[1585]: E0510 00:50:26.166665 1585 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-09020fac35\" not found" node="ci-3510.3.7-n-09020fac35" May 10 00:50:26.167050 kubelet[1585]: E0510 00:50:26.167030 1585 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:26.949000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:26.949000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00057c7e0 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:50:26.949000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:26.949000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:26.949000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000d94920 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:50:26.949000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:27.168917 kubelet[1585]: E0510 00:50:27.168843 1585 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-09020fac35\" not found" node="ci-3510.3.7-n-09020fac35" May 10 00:50:27.169653 kubelet[1585]: E0510 00:50:27.169026 1585 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:27.169653 kubelet[1585]: E0510 00:50:27.169308 1585 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-09020fac35\" not found" node="ci-3510.3.7-n-09020fac35" May 10 00:50:27.169653 kubelet[1585]: E0510 00:50:27.169399 1585 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:27.298303 kubelet[1585]: I0510 00:50:27.298267 1585 kubelet_node_status.go:76] "Attempting to register node" node="ci-3510.3.7-n-09020fac35" May 10 00:50:27.672000 audit[1784]: AVC avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:27.674306 kernel: kauditd_printk_skb: 563 callbacks suppressed May 10 00:50:27.674414 kernel: audit: type=1400 audit(1746838227.672:561): avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:27.672000 audit[1784]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c007cc5260 a2=fc6 a3=0 items=0 ppid=1626 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 key=(null) May 10 00:50:27.681260 kernel: audit: type=1300 audit(1746838227.672:561): arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c007cc5260 a2=fc6 a3=0 items=0 ppid=1626 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 key=(null) May 10 00:50:27.681412 kernel: audit: type=1327 audit(1746838227.672:561): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 10 00:50:27.672000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 10 00:50:27.684000 audit[1784]: AVC avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:27.689174 kernel: audit: type=1400 audit(1746838227.684:562): avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:27.684000 audit[1784]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00138ff20 a2=fc6 a3=0 items=0 ppid=1626 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 key=(null) May 10 00:50:27.693922 kernel: audit: type=1300 audit(1746838227.684:562): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00138ff20 a2=fc6 a3=0 items=0 ppid=1626 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 key=(null) May 10 00:50:27.684000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 10 00:50:27.697656 kernel: audit: type=1327 audit(1746838227.684:562): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 10 00:50:27.684000 audit[1784]: AVC avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:27.701311 kernel: audit: type=1400 audit(1746838227.684:563): avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:27.701469 kernel: audit: type=1300 audit(1746838227.684:563): arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c006edcd20 a2=fc6 a3=0 items=0 ppid=1626 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 key=(null) May 10 00:50:27.684000 audit[1784]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c006edcd20 a2=fc6 a3=0 items=0 ppid=1626 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 key=(null) May 10 00:50:27.684000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 10 00:50:27.709011 kernel: audit: type=1327 audit(1746838227.684:563): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 10 00:50:27.708000 audit[1784]: AVC avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:27.712699 kernel: audit: type=1400 audit(1746838227.708:564): avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:27.708000 audit[1784]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c0039ae660 a2=fc6 a3=0 items=0 ppid=1626 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 key=(null) May 10 00:50:27.708000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 10 00:50:27.752000 audit[1784]: AVC avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:27.752000 audit[1784]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=83 a1=c000f51380 a2=fc6 a3=0 items=0 ppid=1626 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 key=(null) May 10 00:50:27.752000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 10 00:50:27.753000 audit[1784]: AVC avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:27.753000 audit[1784]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=83 a1=c007cc5f20 a2=fc6 a3=0 items=0 ppid=1626 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 key=(null) May 10 00:50:27.753000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 10 00:50:27.845726 kubelet[1585]: E0510 00:50:27.845662 1585 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.7-n-09020fac35\" not found" node="ci-3510.3.7-n-09020fac35" May 10 00:50:27.893078 kubelet[1585]: I0510 00:50:27.893026 1585 kubelet_node_status.go:79] "Successfully registered node" node="ci-3510.3.7-n-09020fac35" May 10 00:50:27.893078 kubelet[1585]: E0510 00:50:27.893079 1585 kubelet_node_status.go:549] "Error updating node status, will retry" err="error getting node \"ci-3510.3.7-n-09020fac35\": node \"ci-3510.3.7-n-09020fac35\" not found" May 10 00:50:27.903796 kubelet[1585]: I0510 00:50:27.903758 1585 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-09020fac35" May 10 00:50:27.924909 kubelet[1585]: E0510 00:50:27.924777 1585 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510.3.7-n-09020fac35\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.7-n-09020fac35" May 10 00:50:27.925121 kubelet[1585]: I0510 00:50:27.925102 1585 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-09020fac35" May 10 00:50:27.929448 kubelet[1585]: E0510 00:50:27.929388 1585 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ci-3510.3.7-n-09020fac35\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-09020fac35" May 10 00:50:27.929705 kubelet[1585]: I0510 00:50:27.929682 1585 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.7-n-09020fac35" May 10 00:50:27.934566 kubelet[1585]: E0510 00:50:27.934519 1585 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510.3.7-n-09020fac35\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-ci-3510.3.7-n-09020fac35" May 10 00:50:28.086167 kubelet[1585]: I0510 00:50:28.086082 1585 apiserver.go:52] "Watching apiserver" May 10 00:50:28.107805 kubelet[1585]: I0510 00:50:28.107750 1585 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:50:29.251015 kubelet[1585]: I0510 00:50:29.250969 1585 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-09020fac35" May 10 00:50:29.259702 kubelet[1585]: W0510 00:50:29.259662 1585 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 00:50:29.260247 kubelet[1585]: E0510 00:50:29.260223 1585 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:30.174221 kubelet[1585]: E0510 00:50:30.174185 1585 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:30.255646 systemd[1]: Reloading. May 10 00:50:30.374841 /usr/lib/systemd/system-generators/torcx-generator[1874]: time="2025-05-10T00:50:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:50:30.374889 /usr/lib/systemd/system-generators/torcx-generator[1874]: time="2025-05-10T00:50:30Z" level=info msg="torcx already run" May 10 00:50:30.500574 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:50:30.500597 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:50:30.525712 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:50:30.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.634000 audit: BPF prog-id=79 op=LOAD May 10 00:50:30.634000 audit: BPF prog-id=63 op=UNLOAD May 10 00:50:30.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.635000 audit: BPF prog-id=80 op=LOAD May 10 00:50:30.635000 audit: BPF prog-id=67 op=UNLOAD May 10 00:50:30.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.637000 audit: BPF prog-id=81 op=LOAD May 10 00:50:30.637000 audit: BPF prog-id=40 op=UNLOAD May 10 00:50:30.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit: BPF prog-id=82 op=LOAD May 10 00:50:30.638000 audit: BPF prog-id=41 op=UNLOAD May 10 00:50:30.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit: BPF prog-id=83 op=LOAD May 10 00:50:30.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.638000 audit: BPF prog-id=84 op=LOAD May 10 00:50:30.638000 audit: BPF prog-id=42 op=UNLOAD May 10 00:50:30.638000 audit: BPF prog-id=43 op=UNLOAD May 10 00:50:30.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.639000 audit: BPF prog-id=85 op=LOAD May 10 00:50:30.639000 audit: BPF prog-id=71 op=UNLOAD May 10 00:50:30.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.641000 audit: BPF prog-id=86 op=LOAD May 10 00:50:30.641000 audit: BPF prog-id=59 op=UNLOAD May 10 00:50:30.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.642000 audit: BPF prog-id=87 op=LOAD May 10 00:50:30.642000 audit: BPF prog-id=75 op=UNLOAD May 10 00:50:30.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.643000 audit: BPF prog-id=88 op=LOAD May 10 00:50:30.643000 audit: BPF prog-id=44 op=UNLOAD May 10 00:50:30.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.643000 audit: BPF prog-id=89 op=LOAD May 10 00:50:30.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.643000 audit: BPF prog-id=90 op=LOAD May 10 00:50:30.643000 audit: BPF prog-id=45 op=UNLOAD May 10 00:50:30.643000 audit: BPF prog-id=46 op=UNLOAD May 10 00:50:30.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.644000 audit: BPF prog-id=91 op=LOAD May 10 00:50:30.644000 audit: BPF prog-id=55 op=UNLOAD May 10 00:50:30.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.646000 audit: BPF prog-id=92 op=LOAD May 10 00:50:30.646000 audit: BPF prog-id=47 op=UNLOAD May 10 00:50:30.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.646000 audit: BPF prog-id=93 op=LOAD May 10 00:50:30.646000 audit: BPF prog-id=48 op=UNLOAD May 10 00:50:30.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.647000 audit: BPF prog-id=94 op=LOAD May 10 00:50:30.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.647000 audit: BPF prog-id=95 op=LOAD May 10 00:50:30.647000 audit: BPF prog-id=49 op=UNLOAD May 10 00:50:30.647000 audit: BPF prog-id=50 op=UNLOAD May 10 00:50:30.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.649000 audit: BPF prog-id=96 op=LOAD May 10 00:50:30.649000 audit: BPF prog-id=51 op=UNLOAD May 10 00:50:30.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.650000 audit: BPF prog-id=97 op=LOAD May 10 00:50:30.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.650000 audit: BPF prog-id=98 op=LOAD May 10 00:50:30.650000 audit: BPF prog-id=52 op=UNLOAD May 10 00:50:30.650000 audit: BPF prog-id=53 op=UNLOAD May 10 00:50:30.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.651000 audit: BPF prog-id=99 op=LOAD May 10 00:50:30.651000 audit: BPF prog-id=54 op=UNLOAD May 10 00:50:30.669034 systemd[1]: Stopping kubelet.service... May 10 00:50:30.695206 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:50:30.695494 systemd[1]: Stopped kubelet.service. May 10 00:50:30.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:30.695595 systemd[1]: kubelet.service: Consumed 1.269s CPU time. May 10 00:50:30.698205 systemd[1]: Starting kubelet.service... May 10 00:50:31.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:31.733367 systemd[1]: Started kubelet.service. May 10 00:50:31.828008 kubelet[1925]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:50:31.828008 kubelet[1925]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 10 00:50:31.828008 kubelet[1925]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:50:31.829169 kubelet[1925]: I0510 00:50:31.829102 1925 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:50:31.845608 kubelet[1925]: I0510 00:50:31.845547 1925 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 10 00:50:31.845608 kubelet[1925]: I0510 00:50:31.845594 1925 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:50:31.846304 kubelet[1925]: I0510 00:50:31.846190 1925 server.go:954] "Client rotation is on, will bootstrap in background" May 10 00:50:31.850696 kubelet[1925]: I0510 00:50:31.850633 1925 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 10 00:50:31.858120 kubelet[1925]: I0510 00:50:31.858062 1925 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:50:31.863862 kubelet[1925]: E0510 00:50:31.863800 1925 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 10 00:50:31.863862 kubelet[1925]: I0510 00:50:31.863858 1925 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 10 00:50:31.869044 kubelet[1925]: I0510 00:50:31.868977 1925 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:50:31.869406 kubelet[1925]: I0510 00:50:31.869357 1925 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:50:31.869721 kubelet[1925]: I0510 00:50:31.869405 1925 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-09020fac35","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 10 00:50:31.869923 kubelet[1925]: I0510 00:50:31.869734 1925 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:50:31.869923 kubelet[1925]: I0510 00:50:31.869751 1925 container_manager_linux.go:304] "Creating device plugin manager" May 10 00:50:31.869923 kubelet[1925]: I0510 00:50:31.869812 1925 state_mem.go:36] "Initialized new in-memory state store" May 10 00:50:31.870084 kubelet[1925]: I0510 00:50:31.870063 1925 kubelet.go:446] "Attempting to sync node with API server" May 10 00:50:31.870928 kubelet[1925]: I0510 00:50:31.870897 1925 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:50:31.871047 kubelet[1925]: I0510 00:50:31.870942 1925 kubelet.go:352] "Adding apiserver pod source" May 10 00:50:31.871047 kubelet[1925]: I0510 00:50:31.870960 1925 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:50:31.879697 kubelet[1925]: I0510 00:50:31.877590 1925 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:50:31.886982 kubelet[1925]: I0510 00:50:31.881117 1925 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:50:31.896234 kubelet[1925]: I0510 00:50:31.896192 1925 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 10 00:50:31.896485 kubelet[1925]: I0510 00:50:31.896467 1925 server.go:1287] "Started kubelet" May 10 00:50:31.898000 audit[1925]: AVC avc: denied { mac_admin } for pid=1925 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:31.898000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:50:31.898000 audit[1925]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ced230 a1=c000cd5320 a2=c000ced200 a3=25 items=0 ppid=1 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:31.898000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:50:31.899000 audit[1925]: AVC avc: denied { mac_admin } for pid=1925 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:31.899000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:50:31.899000 audit[1925]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ce1f40 a1=c000cd5338 a2=c000ced2c0 a3=25 items=0 ppid=1 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:31.899000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:50:31.907513 kubelet[1925]: I0510 00:50:31.899689 1925 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:50:31.907513 kubelet[1925]: I0510 00:50:31.899794 1925 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 10 00:50:31.907513 kubelet[1925]: I0510 00:50:31.899849 1925 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:50:31.908652 kubelet[1925]: I0510 00:50:31.908566 1925 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:50:31.908886 kubelet[1925]: I0510 00:50:31.908857 1925 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 10 00:50:31.916669 kubelet[1925]: I0510 00:50:31.910496 1925 volume_manager.go:297] "Starting Kubelet Volume Manager" May 10 00:50:31.916669 kubelet[1925]: E0510 00:50:31.910819 1925 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-09020fac35\" not found" May 10 00:50:31.916669 kubelet[1925]: I0510 00:50:31.914985 1925 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:50:31.916669 kubelet[1925]: I0510 00:50:31.915156 1925 reconciler.go:26] "Reconciler: start to sync state" May 10 00:50:31.917085 kubelet[1925]: I0510 00:50:31.910509 1925 server.go:490] "Adding debug handlers to kubelet server" May 10 00:50:31.917441 kubelet[1925]: I0510 00:50:31.917382 1925 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:50:31.921681 kubelet[1925]: I0510 00:50:31.919079 1925 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:50:31.921681 kubelet[1925]: I0510 00:50:31.919137 1925 status_manager.go:227] "Starting to sync pod status with apiserver" May 10 00:50:31.921681 kubelet[1925]: I0510 00:50:31.919171 1925 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 10 00:50:31.921681 kubelet[1925]: I0510 00:50:31.919183 1925 kubelet.go:2388] "Starting kubelet main sync loop" May 10 00:50:31.921681 kubelet[1925]: E0510 00:50:31.919258 1925 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:50:31.924329 kubelet[1925]: I0510 00:50:31.924252 1925 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:50:31.924787 kubelet[1925]: I0510 00:50:31.924761 1925 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:50:31.943960 kubelet[1925]: I0510 00:50:31.943915 1925 factory.go:221] Registration of the containerd container factory successfully May 10 00:50:31.943960 kubelet[1925]: I0510 00:50:31.943942 1925 factory.go:221] Registration of the systemd container factory successfully May 10 00:50:31.944334 kubelet[1925]: I0510 00:50:31.944083 1925 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:50:32.020686 kubelet[1925]: E0510 00:50:32.020535 1925 kubelet.go:2412] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 10 00:50:32.093853 kubelet[1925]: I0510 00:50:32.093760 1925 cpu_manager.go:221] "Starting CPU manager" policy="none" May 10 00:50:32.093853 kubelet[1925]: I0510 00:50:32.093822 1925 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 10 00:50:32.093853 kubelet[1925]: I0510 00:50:32.093859 1925 state_mem.go:36] "Initialized new in-memory state store" May 10 00:50:32.094175 kubelet[1925]: I0510 00:50:32.094119 1925 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 10 00:50:32.094309 kubelet[1925]: I0510 00:50:32.094174 1925 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 10 00:50:32.094309 kubelet[1925]: I0510 00:50:32.094205 1925 policy_none.go:49] "None policy: Start" May 10 00:50:32.094309 kubelet[1925]: I0510 00:50:32.094218 1925 memory_manager.go:186] "Starting memorymanager" policy="None" May 10 00:50:32.094309 kubelet[1925]: I0510 00:50:32.094236 1925 state_mem.go:35] "Initializing new in-memory state store" May 10 00:50:32.094513 kubelet[1925]: I0510 00:50:32.094411 1925 state_mem.go:75] "Updated machine memory state" May 10 00:50:32.107103 kubelet[1925]: I0510 00:50:32.107063 1925 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:50:32.107000 audit[1925]: AVC avc: denied { mac_admin } for pid=1925 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:32.107000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:50:32.107000 audit[1925]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f81260 a1=c000af8120 a2=c000f81230 a3=25 items=0 ppid=1 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:32.107000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:50:32.108822 kubelet[1925]: I0510 00:50:32.108790 1925 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:50:32.110892 kubelet[1925]: I0510 00:50:32.110864 1925 eviction_manager.go:189] "Eviction manager: starting control loop" May 10 00:50:32.111087 kubelet[1925]: I0510 00:50:32.111029 1925 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:50:32.113215 kubelet[1925]: I0510 00:50:32.113186 1925 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:50:32.121072 kubelet[1925]: E0510 00:50:32.121033 1925 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 10 00:50:32.143000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 10 00:50:32.143000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0000f6f40 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:50:32.143000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:32.222101 kubelet[1925]: I0510 00:50:32.222038 1925 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.7-n-09020fac35" May 10 00:50:32.222932 kubelet[1925]: I0510 00:50:32.222899 1925 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-09020fac35" May 10 00:50:32.223679 kubelet[1925]: I0510 00:50:32.223653 1925 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-09020fac35" May 10 00:50:32.225375 kubelet[1925]: I0510 00:50:32.225347 1925 kubelet_node_status.go:76] "Attempting to register node" node="ci-3510.3.7-n-09020fac35" May 10 00:50:32.248577 kubelet[1925]: W0510 00:50:32.248526 1925 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 00:50:32.248966 kubelet[1925]: E0510 00:50:32.248928 1925 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ci-3510.3.7-n-09020fac35\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-09020fac35" May 10 00:50:32.249615 kubelet[1925]: W0510 00:50:32.249595 1925 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 00:50:32.251076 kubelet[1925]: W0510 00:50:32.251043 1925 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 00:50:32.256825 kubelet[1925]: I0510 00:50:32.256781 1925 kubelet_node_status.go:125] "Node was previously registered" node="ci-3510.3.7-n-09020fac35" May 10 00:50:32.257160 kubelet[1925]: I0510 00:50:32.257146 1925 kubelet_node_status.go:79] "Successfully registered node" node="ci-3510.3.7-n-09020fac35" May 10 00:50:32.319684 kubelet[1925]: I0510 00:50:32.319529 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7ea8e49d13bdf79c1f28fef65c985330-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-09020fac35\" (UID: \"7ea8e49d13bdf79c1f28fef65c985330\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-09020fac35" May 10 00:50:32.319947 kubelet[1925]: I0510 00:50:32.319916 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8e722b4f4b0782b602edb72bf5921f00-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-09020fac35\" (UID: \"8e722b4f4b0782b602edb72bf5921f00\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-09020fac35" May 10 00:50:32.320145 kubelet[1925]: I0510 00:50:32.320121 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8e722b4f4b0782b602edb72bf5921f00-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-09020fac35\" (UID: \"8e722b4f4b0782b602edb72bf5921f00\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-09020fac35" May 10 00:50:32.320293 kubelet[1925]: I0510 00:50:32.320274 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8e722b4f4b0782b602edb72bf5921f00-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-09020fac35\" (UID: \"8e722b4f4b0782b602edb72bf5921f00\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-09020fac35" May 10 00:50:32.320405 kubelet[1925]: I0510 00:50:32.320387 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/bc938eae5374897d3b7cf5fe34694d39-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-09020fac35\" (UID: \"bc938eae5374897d3b7cf5fe34694d39\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-09020fac35" May 10 00:50:32.320500 kubelet[1925]: I0510 00:50:32.320486 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/bc938eae5374897d3b7cf5fe34694d39-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-09020fac35\" (UID: \"bc938eae5374897d3b7cf5fe34694d39\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-09020fac35" May 10 00:50:32.320597 kubelet[1925]: I0510 00:50:32.320584 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/bc938eae5374897d3b7cf5fe34694d39-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-09020fac35\" (UID: \"bc938eae5374897d3b7cf5fe34694d39\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-09020fac35" May 10 00:50:32.320693 kubelet[1925]: I0510 00:50:32.320681 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/bc938eae5374897d3b7cf5fe34694d39-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-09020fac35\" (UID: \"bc938eae5374897d3b7cf5fe34694d39\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-09020fac35" May 10 00:50:32.320781 kubelet[1925]: I0510 00:50:32.320769 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/bc938eae5374897d3b7cf5fe34694d39-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-09020fac35\" (UID: \"bc938eae5374897d3b7cf5fe34694d39\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-09020fac35" May 10 00:50:32.550137 kubelet[1925]: E0510 00:50:32.550095 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:32.550655 kubelet[1925]: E0510 00:50:32.550155 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:32.551785 kubelet[1925]: E0510 00:50:32.551757 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:32.875021 kubelet[1925]: I0510 00:50:32.874976 1925 apiserver.go:52] "Watching apiserver" May 10 00:50:32.915942 kubelet[1925]: I0510 00:50:32.915891 1925 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:50:32.984569 kubelet[1925]: E0510 00:50:32.984535 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:32.985373 kubelet[1925]: I0510 00:50:32.985350 1925 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-09020fac35" May 10 00:50:32.985773 kubelet[1925]: I0510 00:50:32.985757 1925 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.7-n-09020fac35" May 10 00:50:33.074162 kubelet[1925]: W0510 00:50:33.074111 1925 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 00:50:33.074522 kubelet[1925]: E0510 00:50:33.074489 1925 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510.3.7-n-09020fac35\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.7-n-09020fac35" May 10 00:50:33.074862 kubelet[1925]: E0510 00:50:33.074847 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:33.075694 kubelet[1925]: W0510 00:50:33.075664 1925 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 00:50:33.075786 kubelet[1925]: E0510 00:50:33.075732 1925 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510.3.7-n-09020fac35\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.7-n-09020fac35" May 10 00:50:33.075943 kubelet[1925]: E0510 00:50:33.075922 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:33.154597 kubelet[1925]: I0510 00:50:33.154440 1925 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-09020fac35" podStartSLOduration=4.154415049 podStartE2EDuration="4.154415049s" podCreationTimestamp="2025-05-10 00:50:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:50:33.138284074 +0000 UTC m=+1.394230120" watchObservedRunningTime="2025-05-10 00:50:33.154415049 +0000 UTC m=+1.410361094" May 10 00:50:33.175691 kubelet[1925]: I0510 00:50:33.175570 1925 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.7-n-09020fac35" podStartSLOduration=1.175543375 podStartE2EDuration="1.175543375s" podCreationTimestamp="2025-05-10 00:50:32 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:50:33.158436532 +0000 UTC m=+1.414382579" watchObservedRunningTime="2025-05-10 00:50:33.175543375 +0000 UTC m=+1.431489431" May 10 00:50:33.176247 kubelet[1925]: I0510 00:50:33.176176 1925 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.7-n-09020fac35" podStartSLOduration=1.176156197 podStartE2EDuration="1.176156197s" podCreationTimestamp="2025-05-10 00:50:32 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:50:33.175515243 +0000 UTC m=+1.431461319" watchObservedRunningTime="2025-05-10 00:50:33.176156197 +0000 UTC m=+1.432102246" May 10 00:50:33.986074 kubelet[1925]: E0510 00:50:33.986039 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:33.987022 kubelet[1925]: E0510 00:50:33.986994 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:34.289000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:34.291273 kernel: kauditd_printk_skb: 269 callbacks suppressed May 10 00:50:34.291394 kernel: audit: type=1400 audit(1746838234.289:817): avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:34.289000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000706140 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:50:34.298762 kernel: audit: type=1300 audit(1746838234.289:817): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000706140 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:50:34.289000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:34.304660 kernel: audit: type=1327 audit(1746838234.289:817): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:34.291000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:34.308659 kernel: audit: type=1400 audit(1746838234.291:818): avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:34.291000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000706300 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:50:34.316653 kernel: audit: type=1300 audit(1746838234.291:818): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000706300 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:50:34.316833 kernel: audit: type=1327 audit(1746838234.291:818): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:34.291000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:34.291000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:34.322195 kernel: audit: type=1400 audit(1746838234.291:819): avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:34.291000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007064e0 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:50:34.328647 kernel: audit: type=1300 audit(1746838234.291:819): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007064e0 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:50:34.291000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:34.294000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:34.335496 kernel: audit: type=1327 audit(1746838234.291:819): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:34.335641 kernel: audit: type=1400 audit(1746838234.294:820): avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:34.294000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a2c460 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:50:34.294000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:34.968234 kubelet[1925]: E0510 00:50:34.968179 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:36.379280 kubelet[1925]: I0510 00:50:36.379232 1925 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 10 00:50:36.379919 env[1194]: time="2025-05-10T00:50:36.379794542Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 10 00:50:36.380758 kubelet[1925]: I0510 00:50:36.380727 1925 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 10 00:50:37.066715 systemd[1]: Created slice kubepods-besteffort-pod230af8fc_a8f5_4a4f_b40c_57bd4a969c23.slice. May 10 00:50:37.156599 kubelet[1925]: I0510 00:50:37.156542 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/230af8fc-a8f5-4a4f-b40c-57bd4a969c23-kube-proxy\") pod \"kube-proxy-2nw7k\" (UID: \"230af8fc-a8f5-4a4f-b40c-57bd4a969c23\") " pod="kube-system/kube-proxy-2nw7k" May 10 00:50:37.156599 kubelet[1925]: I0510 00:50:37.156592 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8zdhg\" (UniqueName: \"kubernetes.io/projected/230af8fc-a8f5-4a4f-b40c-57bd4a969c23-kube-api-access-8zdhg\") pod \"kube-proxy-2nw7k\" (UID: \"230af8fc-a8f5-4a4f-b40c-57bd4a969c23\") " pod="kube-system/kube-proxy-2nw7k" May 10 00:50:37.156868 kubelet[1925]: I0510 00:50:37.156612 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/230af8fc-a8f5-4a4f-b40c-57bd4a969c23-xtables-lock\") pod \"kube-proxy-2nw7k\" (UID: \"230af8fc-a8f5-4a4f-b40c-57bd4a969c23\") " pod="kube-system/kube-proxy-2nw7k" May 10 00:50:37.156868 kubelet[1925]: I0510 00:50:37.156665 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/230af8fc-a8f5-4a4f-b40c-57bd4a969c23-lib-modules\") pod \"kube-proxy-2nw7k\" (UID: \"230af8fc-a8f5-4a4f-b40c-57bd4a969c23\") " pod="kube-system/kube-proxy-2nw7k" May 10 00:50:37.269416 kubelet[1925]: I0510 00:50:37.269372 1925 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 10 00:50:37.377369 kubelet[1925]: E0510 00:50:37.377237 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:37.378548 env[1194]: time="2025-05-10T00:50:37.378477458Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2nw7k,Uid:230af8fc-a8f5-4a4f-b40c-57bd4a969c23,Namespace:kube-system,Attempt:0,}" May 10 00:50:37.378924 kubelet[1925]: E0510 00:50:37.378904 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:37.401127 env[1194]: time="2025-05-10T00:50:37.400745672Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:37.401127 env[1194]: time="2025-05-10T00:50:37.400854608Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:37.401127 env[1194]: time="2025-05-10T00:50:37.400879066Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:37.407399 env[1194]: time="2025-05-10T00:50:37.401075158Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/edf5505e09b5661d692a77b1439a10e1dbbb0859c68ff3e52b3c995f8536fed3 pid=1993 runtime=io.containerd.runc.v2 May 10 00:50:37.439413 systemd[1]: Started cri-containerd-edf5505e09b5661d692a77b1439a10e1dbbb0859c68ff3e52b3c995f8536fed3.scope. May 10 00:50:37.584359 systemd[1]: Created slice kubepods-besteffort-podbba6a355_4163_43ac_981a_01eb90674b65.slice. May 10 00:50:37.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.634000 audit: BPF prog-id=100 op=LOAD May 10 00:50:37.636000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1993 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:37.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564663535303565303962353636316436393261373762313433396131 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1993 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:37.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564663535303565303962353636316436393261373762313433396131 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit: BPF prog-id=101 op=LOAD May 10 00:50:37.636000 audit[2002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003174c0 items=0 ppid=1993 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:37.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564663535303565303962353636316436393261373762313433396131 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit: BPF prog-id=102 op=LOAD May 10 00:50:37.636000 audit[2002]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000317508 items=0 ppid=1993 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:37.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564663535303565303962353636316436393261373762313433396131 May 10 00:50:37.636000 audit: BPF prog-id=102 op=UNLOAD May 10 00:50:37.636000 audit: BPF prog-id=101 op=UNLOAD May 10 00:50:37.636000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { perfmon } for pid=2002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit[2002]: AVC avc: denied { bpf } for pid=2002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.636000 audit: BPF prog-id=103 op=LOAD May 10 00:50:37.636000 audit[2002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000317918 items=0 ppid=1993 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:37.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564663535303565303962353636316436393261373762313433396131 May 10 00:50:37.663263 kubelet[1925]: I0510 00:50:37.661764 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/bba6a355-4163-43ac-981a-01eb90674b65-var-lib-calico\") pod \"tigera-operator-789496d6f5-r8hw6\" (UID: \"bba6a355-4163-43ac-981a-01eb90674b65\") " pod="tigera-operator/tigera-operator-789496d6f5-r8hw6" May 10 00:50:37.663263 kubelet[1925]: I0510 00:50:37.661816 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8j2wr\" (UniqueName: \"kubernetes.io/projected/bba6a355-4163-43ac-981a-01eb90674b65-kube-api-access-8j2wr\") pod \"tigera-operator-789496d6f5-r8hw6\" (UID: \"bba6a355-4163-43ac-981a-01eb90674b65\") " pod="tigera-operator/tigera-operator-789496d6f5-r8hw6" May 10 00:50:37.667956 env[1194]: time="2025-05-10T00:50:37.667905053Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2nw7k,Uid:230af8fc-a8f5-4a4f-b40c-57bd4a969c23,Namespace:kube-system,Attempt:0,} returns sandbox id \"edf5505e09b5661d692a77b1439a10e1dbbb0859c68ff3e52b3c995f8536fed3\"" May 10 00:50:37.669948 kubelet[1925]: E0510 00:50:37.669386 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:37.675030 env[1194]: time="2025-05-10T00:50:37.674987119Z" level=info msg="CreateContainer within sandbox \"edf5505e09b5661d692a77b1439a10e1dbbb0859c68ff3e52b3c995f8536fed3\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 10 00:50:37.686000 audit[1331]: USER_END pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:37.686000 audit[1331]: CRED_DISP pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:37.686855 sudo[1331]: pam_unix(sudo:session): session closed for user root May 10 00:50:37.692098 env[1194]: time="2025-05-10T00:50:37.691861249Z" level=info msg="CreateContainer within sandbox \"edf5505e09b5661d692a77b1439a10e1dbbb0859c68ff3e52b3c995f8536fed3\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"3a172c83c732ef3fda5315db56cbe7a7a7c3db488c6818db034cbeecaadce038\"" May 10 00:50:37.695129 env[1194]: time="2025-05-10T00:50:37.695086354Z" level=info msg="StartContainer for \"3a172c83c732ef3fda5315db56cbe7a7a7c3db488c6818db034cbeecaadce038\"" May 10 00:50:37.697782 sshd[1328]: pam_unix(sshd:session): session closed for user core May 10 00:50:37.699000 audit[1328]: USER_END pid=1328 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:37.699000 audit[1328]: CRED_DISP pid=1328 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:37.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-146.190.154.235:22-139.178.68.195:46086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:37.701847 systemd[1]: sshd@6-146.190.154.235:22-139.178.68.195:46086.service: Deactivated successfully. May 10 00:50:37.702591 systemd[1]: session-7.scope: Deactivated successfully. May 10 00:50:37.702783 systemd[1]: session-7.scope: Consumed 5.364s CPU time. May 10 00:50:37.704382 systemd-logind[1179]: Session 7 logged out. Waiting for processes to exit. May 10 00:50:37.705554 systemd-logind[1179]: Removed session 7. May 10 00:50:37.718925 systemd[1]: Started cri-containerd-3a172c83c732ef3fda5315db56cbe7a7a7c3db488c6818db034cbeecaadce038.scope. May 10 00:50:37.742000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f55e29b5148 items=0 ppid=1993 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:37.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361313732633833633733326566336664613533313564623536636265 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit: BPF prog-id=104 op=LOAD May 10 00:50:37.742000 audit[2047]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003dc098 items=0 ppid=1993 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:37.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361313732633833633733326566336664613533313564623536636265 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit: BPF prog-id=105 op=LOAD May 10 00:50:37.742000 audit[2047]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003dc0e8 items=0 ppid=1993 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:37.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361313732633833633733326566336664613533313564623536636265 May 10 00:50:37.742000 audit: BPF prog-id=105 op=UNLOAD May 10 00:50:37.742000 audit: BPF prog-id=104 op=UNLOAD May 10 00:50:37.742000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.742000 audit: BPF prog-id=106 op=LOAD May 10 00:50:37.742000 audit[2047]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003dc178 items=0 ppid=1993 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:37.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361313732633833633733326566336664613533313564623536636265 May 10 00:50:37.760681 env[1194]: time="2025-05-10T00:50:37.760592273Z" level=info msg="StartContainer for \"3a172c83c732ef3fda5315db56cbe7a7a7c3db488c6818db034cbeecaadce038\" returns successfully" May 10 00:50:37.892385 env[1194]: time="2025-05-10T00:50:37.892267388Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-r8hw6,Uid:bba6a355-4163-43ac-981a-01eb90674b65,Namespace:tigera-operator,Attempt:0,}" May 10 00:50:37.919773 env[1194]: time="2025-05-10T00:50:37.919592271Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:37.919773 env[1194]: time="2025-05-10T00:50:37.919675675Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:37.919773 env[1194]: time="2025-05-10T00:50:37.919687989Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:37.921916 env[1194]: time="2025-05-10T00:50:37.921702713Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a72d22813a86fa68b1e5e153f0abebacc0e69c507b593a4b8163894ddc3fc174 pid=2082 runtime=io.containerd.runc.v2 May 10 00:50:37.940907 systemd[1]: Started cri-containerd-a72d22813a86fa68b1e5e153f0abebacc0e69c507b593a4b8163894ddc3fc174.scope. May 10 00:50:37.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.972000 audit: BPF prog-id=107 op=LOAD May 10 00:50:37.973000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.973000 audit[2092]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2082 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:37.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137326432323831336138366661363862316535653135336630616265 May 10 00:50:37.973000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.973000 audit[2092]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2082 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:37.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137326432323831336138366661363862316535653135336630616265 May 10 00:50:37.973000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.973000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.973000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.973000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.973000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.973000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.973000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.973000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.973000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.973000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.973000 audit: BPF prog-id=108 op=LOAD May 10 00:50:37.973000 audit[2092]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00022f520 items=0 ppid=2082 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:37.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137326432323831336138366661363862316535653135336630616265 May 10 00:50:37.974000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.974000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.974000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.974000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.974000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.974000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.974000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.974000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.974000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.974000 audit: BPF prog-id=109 op=LOAD May 10 00:50:37.974000 audit[2092]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00022f568 items=0 ppid=2082 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:37.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137326432323831336138366661363862316535653135336630616265 May 10 00:50:37.974000 audit: BPF prog-id=109 op=UNLOAD May 10 00:50:37.974000 audit: BPF prog-id=108 op=UNLOAD May 10 00:50:37.974000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.974000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.974000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.974000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.974000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.974000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.974000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.974000 audit[2092]: AVC avc: denied { perfmon } for pid=2092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.974000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.974000 audit[2092]: AVC avc: denied { bpf } for pid=2092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:37.974000 audit: BPF prog-id=110 op=LOAD May 10 00:50:37.974000 audit[2092]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00022f978 items=0 ppid=2082 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:37.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137326432323831336138366661363862316535653135336630616265 May 10 00:50:37.995685 kubelet[1925]: E0510 00:50:37.995209 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:37.995685 kubelet[1925]: E0510 00:50:37.995351 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:38.033382 kubelet[1925]: I0510 00:50:38.033252 1925 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-2nw7k" podStartSLOduration=1.033210591 podStartE2EDuration="1.033210591s" podCreationTimestamp="2025-05-10 00:50:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:50:38.016280394 +0000 UTC m=+6.272226441" watchObservedRunningTime="2025-05-10 00:50:38.033210591 +0000 UTC m=+6.289156664" May 10 00:50:38.045611 env[1194]: time="2025-05-10T00:50:38.045553051Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-r8hw6,Uid:bba6a355-4163-43ac-981a-01eb90674b65,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"a72d22813a86fa68b1e5e153f0abebacc0e69c507b593a4b8163894ddc3fc174\"" May 10 00:50:38.050488 env[1194]: time="2025-05-10T00:50:38.050441234Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 10 00:50:38.169000 audit[2150]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.169000 audit[2150]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd57cba540 a2=0 a3=7ffd57cba52c items=0 ppid=2058 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.169000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:50:38.172000 audit[2152]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.172000 audit[2152]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff073b41d0 a2=0 a3=7fff073b41bc items=0 ppid=2058 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.172000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:50:38.173000 audit[2153]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=2153 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.173000 audit[2153]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd4795fe60 a2=0 a3=7ffd4795fe4c items=0 ppid=2058 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.173000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:50:38.175000 audit[2154]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2154 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.175000 audit[2154]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb7e79a60 a2=0 a3=7fffb7e79a4c items=0 ppid=2058 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.175000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:50:38.175000 audit[2155]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2155 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.175000 audit[2155]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4d463af0 a2=0 a3=7fff4d463adc items=0 ppid=2058 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.175000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:50:38.179000 audit[2156]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2156 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.179000 audit[2156]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff2ceb1be0 a2=0 a3=7fff2ceb1bcc items=0 ppid=2058 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:50:38.283970 systemd[1]: run-containerd-runc-k8s.io-edf5505e09b5661d692a77b1439a10e1dbbb0859c68ff3e52b3c995f8536fed3-runc.ut4ttO.mount: Deactivated successfully. May 10 00:50:38.286000 audit[2157]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.286000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc89625d90 a2=0 a3=7ffc89625d7c items=0 ppid=2058 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:50:38.292000 audit[2159]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2159 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.292000 audit[2159]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff4365abb0 a2=0 a3=7fff4365ab9c items=0 ppid=2058 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.292000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 10 00:50:38.299000 audit[2162]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2162 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.299000 audit[2162]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffedce8a710 a2=0 a3=7ffedce8a6fc items=0 ppid=2058 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 10 00:50:38.300000 audit[2163]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.300000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe17c77eb0 a2=0 a3=7ffe17c77e9c items=0 ppid=2058 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.300000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:50:38.304000 audit[2165]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2165 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.304000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd0b2c39f0 a2=0 a3=7ffd0b2c39dc items=0 ppid=2058 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.304000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:50:38.306000 audit[2166]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.306000 audit[2166]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4e012300 a2=0 a3=7ffc4e0122ec items=0 ppid=2058 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.306000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:50:38.310000 audit[2168]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2168 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.310000 audit[2168]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd64580430 a2=0 a3=7ffd6458041c items=0 ppid=2058 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.310000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:50:38.315000 audit[2171]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2171 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.315000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffde14d5e30 a2=0 a3=7ffde14d5e1c items=0 ppid=2058 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.315000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 10 00:50:38.317000 audit[2172]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.317000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffddaba2a60 a2=0 a3=7ffddaba2a4c items=0 ppid=2058 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:50:38.321000 audit[2174]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2174 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.321000 audit[2174]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd47b3cb70 a2=0 a3=7ffd47b3cb5c items=0 ppid=2058 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.321000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:50:38.324000 audit[2175]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.324000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd7d370c0 a2=0 a3=7ffdd7d370ac items=0 ppid=2058 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.324000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:50:38.328000 audit[2177]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.328000 audit[2177]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffc2346320 a2=0 a3=7fffc234630c items=0 ppid=2058 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.328000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:50:38.333000 audit[2180]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.333000 audit[2180]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc395d3ee0 a2=0 a3=7ffc395d3ecc items=0 ppid=2058 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:50:38.340000 audit[2183]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.340000 audit[2183]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffee4c32150 a2=0 a3=7ffee4c3213c items=0 ppid=2058 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.340000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:50:38.345000 audit[2184]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.345000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff3a34dad0 a2=0 a3=7fff3a34dabc items=0 ppid=2058 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.345000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:50:38.351000 audit[2186]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.351000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe409f7090 a2=0 a3=7ffe409f707c items=0 ppid=2058 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.351000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:50:38.359000 audit[2189]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.359000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe7a2b3fa0 a2=0 a3=7ffe7a2b3f8c items=0 ppid=2058 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:50:38.361000 audit[2190]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.361000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe09557e90 a2=0 a3=7ffe09557e7c items=0 ppid=2058 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.361000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:50:38.365000 audit[2192]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:38.365000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd725afdf0 a2=0 a3=7ffd725afddc items=0 ppid=2058 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.365000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:50:38.402000 audit[2198]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:38.402000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fffed7afd20 a2=0 a3=7fffed7afd0c items=0 ppid=2058 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.402000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:38.414000 audit[2198]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:38.414000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fffed7afd20 a2=0 a3=7fffed7afd0c items=0 ppid=2058 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.414000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:38.417000 audit[2203]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.417000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd97a21db0 a2=0 a3=7ffd97a21d9c items=0 ppid=2058 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.417000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:50:38.420000 audit[2205]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.420000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc3ece2040 a2=0 a3=7ffc3ece202c items=0 ppid=2058 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.420000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 10 00:50:38.425000 audit[2208]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.425000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc12a5d240 a2=0 a3=7ffc12a5d22c items=0 ppid=2058 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 10 00:50:38.430000 audit[2209]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.430000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1928c020 a2=0 a3=7ffe1928c00c items=0 ppid=2058 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.430000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:50:38.434000 audit[2211]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2211 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.434000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe8baa8020 a2=0 a3=7ffe8baa800c items=0 ppid=2058 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.434000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:50:38.436000 audit[2212]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.436000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd4048ec0 a2=0 a3=7ffdd4048eac items=0 ppid=2058 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.436000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:50:38.440000 audit[2214]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.440000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd938f99a0 a2=0 a3=7ffd938f998c items=0 ppid=2058 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.440000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 10 00:50:38.447000 audit[2217]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.447000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff49a39a30 a2=0 a3=7fff49a39a1c items=0 ppid=2058 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.447000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:50:38.449000 audit[2218]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.449000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe69c5e430 a2=0 a3=7ffe69c5e41c items=0 ppid=2058 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:50:38.453000 audit[2220]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.453000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcda8b44f0 a2=0 a3=7ffcda8b44dc items=0 ppid=2058 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.453000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:50:38.455000 audit[2221]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.455000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7a357310 a2=0 a3=7fff7a3572fc items=0 ppid=2058 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.455000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:50:38.458000 audit[2223]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.458000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff063befd0 a2=0 a3=7fff063befbc items=0 ppid=2058 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.458000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:50:38.463000 audit[2226]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.463000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd68d46ff0 a2=0 a3=7ffd68d46fdc items=0 ppid=2058 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.463000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:50:38.470000 audit[2229]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.470000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff7f2e4790 a2=0 a3=7fff7f2e477c items=0 ppid=2058 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.470000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 10 00:50:38.472000 audit[2230]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.472000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd77f22900 a2=0 a3=7ffd77f228ec items=0 ppid=2058 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.472000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:50:38.475000 audit[2232]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.475000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffeb9de80d0 a2=0 a3=7ffeb9de80bc items=0 ppid=2058 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.475000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:50:38.480000 audit[2235]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.480000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc24f5f3b0 a2=0 a3=7ffc24f5f39c items=0 ppid=2058 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.480000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:50:38.482000 audit[2236]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.482000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3fd3be10 a2=0 a3=7ffd3fd3bdfc items=0 ppid=2058 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.482000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:50:38.486000 audit[2238]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.486000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdeb320a80 a2=0 a3=7ffdeb320a6c items=0 ppid=2058 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.486000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:50:38.488000 audit[2239]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.488000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc85c87820 a2=0 a3=7ffc85c8780c items=0 ppid=2058 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.488000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:50:38.491000 audit[2241]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.491000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff9442ca60 a2=0 a3=7fff9442ca4c items=0 ppid=2058 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.491000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:50:38.496000 audit[2244]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:38.496000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeddb2c460 a2=0 a3=7ffeddb2c44c items=0 ppid=2058 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.496000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:50:38.500000 audit[2246]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:50:38.500000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffec1366d70 a2=0 a3=7ffec1366d5c items=0 ppid=2058 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.500000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:38.500000 audit[2246]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:50:38.500000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffec1366d70 a2=0 a3=7ffec1366d5c items=0 ppid=2058 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:38.500000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:39.434580 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount470117793.mount: Deactivated successfully. May 10 00:50:40.639226 env[1194]: time="2025-05-10T00:50:40.639126403Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:40.641231 env[1194]: time="2025-05-10T00:50:40.641179054Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:40.642892 env[1194]: time="2025-05-10T00:50:40.642845697Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:40.644702 env[1194]: time="2025-05-10T00:50:40.644658862Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:40.645755 env[1194]: time="2025-05-10T00:50:40.645720057Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 10 00:50:40.657926 env[1194]: time="2025-05-10T00:50:40.657865998Z" level=info msg="CreateContainer within sandbox \"a72d22813a86fa68b1e5e153f0abebacc0e69c507b593a4b8163894ddc3fc174\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 10 00:50:40.670759 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3852500338.mount: Deactivated successfully. May 10 00:50:40.678419 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount878521862.mount: Deactivated successfully. May 10 00:50:40.682772 env[1194]: time="2025-05-10T00:50:40.682604760Z" level=info msg="CreateContainer within sandbox \"a72d22813a86fa68b1e5e153f0abebacc0e69c507b593a4b8163894ddc3fc174\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"50710e3f01cb24d76c2eb2418826b1f6f99ccbbf15733b625ac1ec155e8f9294\"" May 10 00:50:40.685075 env[1194]: time="2025-05-10T00:50:40.684695233Z" level=info msg="StartContainer for \"50710e3f01cb24d76c2eb2418826b1f6f99ccbbf15733b625ac1ec155e8f9294\"" May 10 00:50:40.718840 systemd[1]: Started cri-containerd-50710e3f01cb24d76c2eb2418826b1f6f99ccbbf15733b625ac1ec155e8f9294.scope. May 10 00:50:40.746130 kernel: kauditd_printk_skb: 317 callbacks suppressed May 10 00:50:40.746304 kernel: audit: type=1400 audit(1746838240.739:919): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.754394 kernel: audit: type=1400 audit(1746838240.739:920): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.754561 kernel: audit: type=1400 audit(1746838240.739:921): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.757700 kernel: audit: type=1400 audit(1746838240.739:922): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.760643 kernel: audit: type=1400 audit(1746838240.739:923): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.763660 kernel: audit: type=1400 audit(1746838240.739:924): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.770628 kernel: audit: type=1400 audit(1746838240.739:925): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.770771 kernel: audit: type=1400 audit(1746838240.739:926): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.780691 kernel: audit: type=1400 audit(1746838240.739:927): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.739000 audit: BPF prog-id=111 op=LOAD May 10 00:50:40.783714 kernel: audit: type=1400 audit(1746838240.739:928): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2082 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:40.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530373130653366303163623234643736633265623234313838323662 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2082 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:40.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530373130653366303163623234643736633265623234313838323662 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit: BPF prog-id=112 op=LOAD May 10 00:50:40.745000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003c5040 items=0 ppid=2082 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:40.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530373130653366303163623234643736633265623234313838323662 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit: BPF prog-id=113 op=LOAD May 10 00:50:40.745000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003c5088 items=0 ppid=2082 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:40.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530373130653366303163623234643736633265623234313838323662 May 10 00:50:40.745000 audit: BPF prog-id=113 op=UNLOAD May 10 00:50:40.745000 audit: BPF prog-id=112 op=UNLOAD May 10 00:50:40.745000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:40.745000 audit: BPF prog-id=114 op=LOAD May 10 00:50:40.745000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c5498 items=0 ppid=2082 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:40.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530373130653366303163623234643736633265623234313838323662 May 10 00:50:40.801526 env[1194]: time="2025-05-10T00:50:40.801457395Z" level=info msg="StartContainer for \"50710e3f01cb24d76c2eb2418826b1f6f99ccbbf15733b625ac1ec155e8f9294\" returns successfully" May 10 00:50:42.202598 kubelet[1925]: E0510 00:50:42.202557 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:42.222646 kubelet[1925]: I0510 00:50:42.222522 1925 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-789496d6f5-r8hw6" podStartSLOduration=2.6196101499999997 podStartE2EDuration="5.222455694s" podCreationTimestamp="2025-05-10 00:50:37 +0000 UTC" firstStartedPulling="2025-05-10 00:50:38.049038858 +0000 UTC m=+6.304984894" lastFinishedPulling="2025-05-10 00:50:40.651884413 +0000 UTC m=+8.907830438" observedRunningTime="2025-05-10 00:50:41.025706629 +0000 UTC m=+9.281652679" watchObservedRunningTime="2025-05-10 00:50:42.222455694 +0000 UTC m=+10.478401750" May 10 00:50:43.011895 kubelet[1925]: E0510 00:50:43.011841 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:43.872000 audit[2296]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:43.872000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe5808a8d0 a2=0 a3=7ffe5808a8bc items=0 ppid=2058 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.872000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:43.876000 audit[2296]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:43.876000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe5808a8d0 a2=0 a3=0 items=0 ppid=2058 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.876000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:43.899000 audit[2298]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:43.899000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdd1d3f540 a2=0 a3=7ffdd1d3f52c items=0 ppid=2058 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.899000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:43.903000 audit[2298]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:43.903000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdd1d3f540 a2=0 a3=0 items=0 ppid=2058 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.903000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:44.051010 systemd[1]: Created slice kubepods-besteffort-pod5049a645_3dcc_4260_9391_266a9c5c9818.slice. May 10 00:50:44.108891 kubelet[1925]: I0510 00:50:44.108834 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5049a645-3dcc-4260-9391-266a9c5c9818-tigera-ca-bundle\") pod \"calico-typha-66b48db7b8-2jb8x\" (UID: \"5049a645-3dcc-4260-9391-266a9c5c9818\") " pod="calico-system/calico-typha-66b48db7b8-2jb8x" May 10 00:50:44.108891 kubelet[1925]: I0510 00:50:44.108894 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lm5n8\" (UniqueName: \"kubernetes.io/projected/5049a645-3dcc-4260-9391-266a9c5c9818-kube-api-access-lm5n8\") pod \"calico-typha-66b48db7b8-2jb8x\" (UID: \"5049a645-3dcc-4260-9391-266a9c5c9818\") " pod="calico-system/calico-typha-66b48db7b8-2jb8x" May 10 00:50:44.109465 kubelet[1925]: I0510 00:50:44.108929 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/5049a645-3dcc-4260-9391-266a9c5c9818-typha-certs\") pod \"calico-typha-66b48db7b8-2jb8x\" (UID: \"5049a645-3dcc-4260-9391-266a9c5c9818\") " pod="calico-system/calico-typha-66b48db7b8-2jb8x" May 10 00:50:44.284527 systemd[1]: Created slice kubepods-besteffort-poda33a97ca_add2_482d_9745_1f3481765bd1.slice. May 10 00:50:44.310598 kubelet[1925]: I0510 00:50:44.310527 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a33a97ca-add2-482d-9745-1f3481765bd1-lib-modules\") pod \"calico-node-plfvd\" (UID: \"a33a97ca-add2-482d-9745-1f3481765bd1\") " pod="calico-system/calico-node-plfvd" May 10 00:50:44.310942 kubelet[1925]: I0510 00:50:44.310884 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a33a97ca-add2-482d-9745-1f3481765bd1-var-lib-calico\") pod \"calico-node-plfvd\" (UID: \"a33a97ca-add2-482d-9745-1f3481765bd1\") " pod="calico-system/calico-node-plfvd" May 10 00:50:44.311184 kubelet[1925]: I0510 00:50:44.311153 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/a33a97ca-add2-482d-9745-1f3481765bd1-cni-log-dir\") pod \"calico-node-plfvd\" (UID: \"a33a97ca-add2-482d-9745-1f3481765bd1\") " pod="calico-system/calico-node-plfvd" May 10 00:50:44.311408 kubelet[1925]: I0510 00:50:44.311390 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-575nz\" (UniqueName: \"kubernetes.io/projected/a33a97ca-add2-482d-9745-1f3481765bd1-kube-api-access-575nz\") pod \"calico-node-plfvd\" (UID: \"a33a97ca-add2-482d-9745-1f3481765bd1\") " pod="calico-system/calico-node-plfvd" May 10 00:50:44.311553 kubelet[1925]: I0510 00:50:44.311534 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a33a97ca-add2-482d-9745-1f3481765bd1-xtables-lock\") pod \"calico-node-plfvd\" (UID: \"a33a97ca-add2-482d-9745-1f3481765bd1\") " pod="calico-system/calico-node-plfvd" May 10 00:50:44.311786 kubelet[1925]: I0510 00:50:44.311743 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a33a97ca-add2-482d-9745-1f3481765bd1-tigera-ca-bundle\") pod \"calico-node-plfvd\" (UID: \"a33a97ca-add2-482d-9745-1f3481765bd1\") " pod="calico-system/calico-node-plfvd" May 10 00:50:44.311974 kubelet[1925]: I0510 00:50:44.311946 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/a33a97ca-add2-482d-9745-1f3481765bd1-node-certs\") pod \"calico-node-plfvd\" (UID: \"a33a97ca-add2-482d-9745-1f3481765bd1\") " pod="calico-system/calico-node-plfvd" May 10 00:50:44.312239 kubelet[1925]: I0510 00:50:44.312183 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/a33a97ca-add2-482d-9745-1f3481765bd1-cni-bin-dir\") pod \"calico-node-plfvd\" (UID: \"a33a97ca-add2-482d-9745-1f3481765bd1\") " pod="calico-system/calico-node-plfvd" May 10 00:50:44.312394 kubelet[1925]: I0510 00:50:44.312379 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/a33a97ca-add2-482d-9745-1f3481765bd1-cni-net-dir\") pod \"calico-node-plfvd\" (UID: \"a33a97ca-add2-482d-9745-1f3481765bd1\") " pod="calico-system/calico-node-plfvd" May 10 00:50:44.312525 kubelet[1925]: I0510 00:50:44.312508 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/a33a97ca-add2-482d-9745-1f3481765bd1-policysync\") pod \"calico-node-plfvd\" (UID: \"a33a97ca-add2-482d-9745-1f3481765bd1\") " pod="calico-system/calico-node-plfvd" May 10 00:50:44.312667 kubelet[1925]: I0510 00:50:44.312653 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/a33a97ca-add2-482d-9745-1f3481765bd1-var-run-calico\") pod \"calico-node-plfvd\" (UID: \"a33a97ca-add2-482d-9745-1f3481765bd1\") " pod="calico-system/calico-node-plfvd" May 10 00:50:44.312804 kubelet[1925]: I0510 00:50:44.312790 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/a33a97ca-add2-482d-9745-1f3481765bd1-flexvol-driver-host\") pod \"calico-node-plfvd\" (UID: \"a33a97ca-add2-482d-9745-1f3481765bd1\") " pod="calico-system/calico-node-plfvd" May 10 00:50:44.354129 kubelet[1925]: E0510 00:50:44.354082 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:44.355287 env[1194]: time="2025-05-10T00:50:44.354800343Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-66b48db7b8-2jb8x,Uid:5049a645-3dcc-4260-9391-266a9c5c9818,Namespace:calico-system,Attempt:0,}" May 10 00:50:44.380656 env[1194]: time="2025-05-10T00:50:44.378737471Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:44.380656 env[1194]: time="2025-05-10T00:50:44.378884909Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:44.380656 env[1194]: time="2025-05-10T00:50:44.378912318Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:44.382429 env[1194]: time="2025-05-10T00:50:44.381972422Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b3e040d877a48b45e8cd4a0b8a74e7114e935085c3c7a4b973a0a3f67b70c45d pid=2310 runtime=io.containerd.runc.v2 May 10 00:50:44.423454 systemd[1]: Started cri-containerd-b3e040d877a48b45e8cd4a0b8a74e7114e935085c3c7a4b973a0a3f67b70c45d.scope. May 10 00:50:44.427122 kubelet[1925]: E0510 00:50:44.427037 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.427122 kubelet[1925]: W0510 00:50:44.427078 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.429346 kubelet[1925]: E0510 00:50:44.429307 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.451395 kubelet[1925]: E0510 00:50:44.451351 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.451395 kubelet[1925]: W0510 00:50:44.451379 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.451395 kubelet[1925]: E0510 00:50:44.451409 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.456086 kubelet[1925]: E0510 00:50:44.455556 1925 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h5n6j" podUID="afb76990-e60f-4e5f-9a6c-3c9209337ad5" May 10 00:50:44.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.496000 audit: BPF prog-id=115 op=LOAD May 10 00:50:44.497000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.497000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2310 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:44.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233653034306438373761343862343565386364346130623861373465 May 10 00:50:44.497000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.497000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2310 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:44.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233653034306438373761343862343565386364346130623861373465 May 10 00:50:44.498000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.498000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.498000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.498000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.498000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.498000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.498000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.498000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.498000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.498000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.498000 audit: BPF prog-id=116 op=LOAD May 10 00:50:44.498000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001d12a0 items=0 ppid=2310 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:44.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233653034306438373761343862343565386364346130623861373465 May 10 00:50:44.499000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.499000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.499000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.499000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.499000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.499000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.499000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.499000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.499000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.499000 audit: BPF prog-id=117 op=LOAD May 10 00:50:44.499000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001d12e8 items=0 ppid=2310 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:44.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233653034306438373761343862343565386364346130623861373465 May 10 00:50:44.499000 audit: BPF prog-id=117 op=UNLOAD May 10 00:50:44.499000 audit: BPF prog-id=116 op=UNLOAD May 10 00:50:44.499000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.499000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.499000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.499000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.499000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.499000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.499000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.499000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.499000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.499000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.499000 audit: BPF prog-id=118 op=LOAD May 10 00:50:44.499000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001d16f8 items=0 ppid=2310 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:44.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233653034306438373761343862343565386364346130623861373465 May 10 00:50:44.505372 kubelet[1925]: E0510 00:50:44.504791 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.505372 kubelet[1925]: W0510 00:50:44.504821 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.505372 kubelet[1925]: E0510 00:50:44.504855 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.505372 kubelet[1925]: E0510 00:50:44.505156 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.505372 kubelet[1925]: W0510 00:50:44.505171 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.505372 kubelet[1925]: E0510 00:50:44.505185 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.506708 kubelet[1925]: E0510 00:50:44.505890 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.506708 kubelet[1925]: W0510 00:50:44.505906 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.506708 kubelet[1925]: E0510 00:50:44.505921 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.506708 kubelet[1925]: E0510 00:50:44.506270 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.506708 kubelet[1925]: W0510 00:50:44.506279 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.506708 kubelet[1925]: E0510 00:50:44.506289 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.506708 kubelet[1925]: E0510 00:50:44.506542 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.506708 kubelet[1925]: W0510 00:50:44.506550 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.506708 kubelet[1925]: E0510 00:50:44.506561 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.509946 kubelet[1925]: E0510 00:50:44.509696 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.509946 kubelet[1925]: W0510 00:50:44.509732 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.509946 kubelet[1925]: E0510 00:50:44.509755 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.510507 kubelet[1925]: E0510 00:50:44.510319 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.510507 kubelet[1925]: W0510 00:50:44.510351 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.510507 kubelet[1925]: E0510 00:50:44.510369 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.510909 kubelet[1925]: E0510 00:50:44.510803 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.510909 kubelet[1925]: W0510 00:50:44.510834 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.510909 kubelet[1925]: E0510 00:50:44.510855 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.511677 kubelet[1925]: E0510 00:50:44.511649 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.511841 kubelet[1925]: W0510 00:50:44.511819 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.511973 kubelet[1925]: E0510 00:50:44.511953 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.512443 kubelet[1925]: E0510 00:50:44.512415 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.512537 kubelet[1925]: W0510 00:50:44.512521 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.512637 kubelet[1925]: E0510 00:50:44.512610 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.512986 kubelet[1925]: E0510 00:50:44.512968 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.513102 kubelet[1925]: W0510 00:50:44.513087 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.513289 kubelet[1925]: E0510 00:50:44.513268 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.513699 kubelet[1925]: E0510 00:50:44.513675 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.513814 kubelet[1925]: W0510 00:50:44.513800 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.513903 kubelet[1925]: E0510 00:50:44.513891 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.514301 kubelet[1925]: E0510 00:50:44.514286 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.514403 kubelet[1925]: W0510 00:50:44.514382 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.514488 kubelet[1925]: E0510 00:50:44.514477 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.514898 kubelet[1925]: E0510 00:50:44.514874 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.515005 kubelet[1925]: W0510 00:50:44.514992 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.515143 kubelet[1925]: E0510 00:50:44.515129 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.516144 kubelet[1925]: E0510 00:50:44.516129 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.516233 kubelet[1925]: W0510 00:50:44.516219 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.516313 kubelet[1925]: E0510 00:50:44.516301 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.516901 kubelet[1925]: E0510 00:50:44.516879 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.517042 kubelet[1925]: W0510 00:50:44.517022 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.517129 kubelet[1925]: E0510 00:50:44.517117 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.517514 kubelet[1925]: E0510 00:50:44.517494 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.517666 kubelet[1925]: W0510 00:50:44.517613 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.517767 kubelet[1925]: E0510 00:50:44.517747 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.518065 kubelet[1925]: E0510 00:50:44.518051 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.518186 kubelet[1925]: W0510 00:50:44.518166 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.518270 kubelet[1925]: E0510 00:50:44.518257 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.522484 kubelet[1925]: E0510 00:50:44.522445 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.522825 kubelet[1925]: W0510 00:50:44.522801 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.522960 kubelet[1925]: E0510 00:50:44.522942 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.523378 kubelet[1925]: E0510 00:50:44.523359 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.523515 kubelet[1925]: W0510 00:50:44.523496 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.523658 kubelet[1925]: E0510 00:50:44.523608 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.524279 kubelet[1925]: E0510 00:50:44.524251 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.524421 kubelet[1925]: W0510 00:50:44.524403 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.524537 kubelet[1925]: E0510 00:50:44.524520 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.524706 kubelet[1925]: I0510 00:50:44.524685 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/afb76990-e60f-4e5f-9a6c-3c9209337ad5-varrun\") pod \"csi-node-driver-h5n6j\" (UID: \"afb76990-e60f-4e5f-9a6c-3c9209337ad5\") " pod="calico-system/csi-node-driver-h5n6j" May 10 00:50:44.526659 kubelet[1925]: E0510 00:50:44.525617 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.526659 kubelet[1925]: W0510 00:50:44.525664 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.526659 kubelet[1925]: E0510 00:50:44.525693 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.526659 kubelet[1925]: E0510 00:50:44.525976 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.526659 kubelet[1925]: W0510 00:50:44.525992 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.526659 kubelet[1925]: E0510 00:50:44.526009 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.526659 kubelet[1925]: E0510 00:50:44.526301 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.526659 kubelet[1925]: W0510 00:50:44.526316 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.526659 kubelet[1925]: E0510 00:50:44.526331 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.527179 kubelet[1925]: I0510 00:50:44.526398 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/afb76990-e60f-4e5f-9a6c-3c9209337ad5-socket-dir\") pod \"csi-node-driver-h5n6j\" (UID: \"afb76990-e60f-4e5f-9a6c-3c9209337ad5\") " pod="calico-system/csi-node-driver-h5n6j" May 10 00:50:44.527179 kubelet[1925]: E0510 00:50:44.526702 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.527179 kubelet[1925]: W0510 00:50:44.526719 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.527179 kubelet[1925]: E0510 00:50:44.526736 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.527179 kubelet[1925]: I0510 00:50:44.526771 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/afb76990-e60f-4e5f-9a6c-3c9209337ad5-registration-dir\") pod \"csi-node-driver-h5n6j\" (UID: \"afb76990-e60f-4e5f-9a6c-3c9209337ad5\") " pod="calico-system/csi-node-driver-h5n6j" May 10 00:50:44.527179 kubelet[1925]: E0510 00:50:44.527048 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.527179 kubelet[1925]: W0510 00:50:44.527064 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.527179 kubelet[1925]: E0510 00:50:44.527080 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.527557 kubelet[1925]: I0510 00:50:44.527110 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/afb76990-e60f-4e5f-9a6c-3c9209337ad5-kubelet-dir\") pod \"csi-node-driver-h5n6j\" (UID: \"afb76990-e60f-4e5f-9a6c-3c9209337ad5\") " pod="calico-system/csi-node-driver-h5n6j" May 10 00:50:44.527557 kubelet[1925]: E0510 00:50:44.527391 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.527557 kubelet[1925]: W0510 00:50:44.527408 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.527557 kubelet[1925]: E0510 00:50:44.527423 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.527557 kubelet[1925]: I0510 00:50:44.527447 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5cvlt\" (UniqueName: \"kubernetes.io/projected/afb76990-e60f-4e5f-9a6c-3c9209337ad5-kube-api-access-5cvlt\") pod \"csi-node-driver-h5n6j\" (UID: \"afb76990-e60f-4e5f-9a6c-3c9209337ad5\") " pod="calico-system/csi-node-driver-h5n6j" May 10 00:50:44.527857 kubelet[1925]: E0510 00:50:44.527804 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.527857 kubelet[1925]: W0510 00:50:44.527820 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.527857 kubelet[1925]: E0510 00:50:44.527837 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.528111 kubelet[1925]: E0510 00:50:44.528070 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.528111 kubelet[1925]: W0510 00:50:44.528091 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.528227 kubelet[1925]: E0510 00:50:44.528123 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.528526 kubelet[1925]: E0510 00:50:44.528402 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.528526 kubelet[1925]: W0510 00:50:44.528422 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.528526 kubelet[1925]: E0510 00:50:44.528454 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.528759 kubelet[1925]: E0510 00:50:44.528706 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.528759 kubelet[1925]: W0510 00:50:44.528720 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.528759 kubelet[1925]: E0510 00:50:44.528734 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.528967 kubelet[1925]: E0510 00:50:44.528946 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.528967 kubelet[1925]: W0510 00:50:44.528962 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.529095 kubelet[1925]: E0510 00:50:44.528984 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.529215 kubelet[1925]: E0510 00:50:44.529197 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.529215 kubelet[1925]: W0510 00:50:44.529212 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.529341 kubelet[1925]: E0510 00:50:44.529232 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.529482 kubelet[1925]: E0510 00:50:44.529464 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.529482 kubelet[1925]: W0510 00:50:44.529478 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.529642 kubelet[1925]: E0510 00:50:44.529495 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.529784 kubelet[1925]: E0510 00:50:44.529765 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.529784 kubelet[1925]: W0510 00:50:44.529781 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.529905 kubelet[1925]: E0510 00:50:44.529795 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.600130 kubelet[1925]: E0510 00:50:44.599930 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:44.606818 env[1194]: time="2025-05-10T00:50:44.606767866Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-plfvd,Uid:a33a97ca-add2-482d-9745-1f3481765bd1,Namespace:calico-system,Attempt:0,}" May 10 00:50:44.617559 env[1194]: time="2025-05-10T00:50:44.617502915Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-66b48db7b8-2jb8x,Uid:5049a645-3dcc-4260-9391-266a9c5c9818,Namespace:calico-system,Attempt:0,} returns sandbox id \"b3e040d877a48b45e8cd4a0b8a74e7114e935085c3c7a4b973a0a3f67b70c45d\"" May 10 00:50:44.621584 kubelet[1925]: E0510 00:50:44.621550 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:44.628147 kubelet[1925]: E0510 00:50:44.628115 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.628354 kubelet[1925]: W0510 00:50:44.628335 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.628447 kubelet[1925]: E0510 00:50:44.628429 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.628764 kubelet[1925]: E0510 00:50:44.628748 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.628894 kubelet[1925]: W0510 00:50:44.628877 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.628969 kubelet[1925]: E0510 00:50:44.628956 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.629216 kubelet[1925]: E0510 00:50:44.629202 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.629302 kubelet[1925]: W0510 00:50:44.629289 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.629367 kubelet[1925]: E0510 00:50:44.629355 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.629615 kubelet[1925]: E0510 00:50:44.629601 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.629794 kubelet[1925]: W0510 00:50:44.629777 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.629865 kubelet[1925]: E0510 00:50:44.629852 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.630153 kubelet[1925]: E0510 00:50:44.630138 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.630251 kubelet[1925]: W0510 00:50:44.630236 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.630316 kubelet[1925]: E0510 00:50:44.630304 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.630628 kubelet[1925]: E0510 00:50:44.630602 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.630730 kubelet[1925]: W0510 00:50:44.630711 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.630827 kubelet[1925]: E0510 00:50:44.630810 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.631112 kubelet[1925]: E0510 00:50:44.631097 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.631217 kubelet[1925]: W0510 00:50:44.631201 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.631301 kubelet[1925]: E0510 00:50:44.631289 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.631404 env[1194]: time="2025-05-10T00:50:44.631362612Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 10 00:50:44.633244 kubelet[1925]: E0510 00:50:44.633201 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.633837 kubelet[1925]: W0510 00:50:44.633783 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.634016 kubelet[1925]: E0510 00:50:44.633992 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.634334 kubelet[1925]: E0510 00:50:44.634320 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.634422 kubelet[1925]: W0510 00:50:44.634406 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.634520 kubelet[1925]: E0510 00:50:44.634504 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.634861 kubelet[1925]: E0510 00:50:44.634845 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.634949 kubelet[1925]: W0510 00:50:44.634935 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.635017 kubelet[1925]: E0510 00:50:44.635005 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.635266 kubelet[1925]: E0510 00:50:44.635254 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.635357 kubelet[1925]: W0510 00:50:44.635343 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.635427 kubelet[1925]: E0510 00:50:44.635415 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.635720 kubelet[1925]: E0510 00:50:44.635706 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.636261 kubelet[1925]: W0510 00:50:44.636234 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.636404 kubelet[1925]: E0510 00:50:44.636386 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.636834 kubelet[1925]: E0510 00:50:44.636816 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.636981 kubelet[1925]: W0510 00:50:44.636961 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.637087 kubelet[1925]: E0510 00:50:44.637070 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.637513 kubelet[1925]: E0510 00:50:44.637495 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.637678 kubelet[1925]: W0510 00:50:44.637617 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.637785 kubelet[1925]: E0510 00:50:44.637767 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.638135 kubelet[1925]: E0510 00:50:44.638117 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.638290 kubelet[1925]: W0510 00:50:44.638271 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.638422 kubelet[1925]: E0510 00:50:44.638404 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.638793 kubelet[1925]: E0510 00:50:44.638776 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.638920 kubelet[1925]: W0510 00:50:44.638899 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.639063 kubelet[1925]: E0510 00:50:44.639044 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.644921 kubelet[1925]: E0510 00:50:44.644879 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.645166 kubelet[1925]: W0510 00:50:44.645141 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.645283 env[1194]: time="2025-05-10T00:50:44.645165395Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:44.645283 env[1194]: time="2025-05-10T00:50:44.645218641Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:44.645283 env[1194]: time="2025-05-10T00:50:44.645228989Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:44.645485 kubelet[1925]: E0510 00:50:44.645467 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.645573 env[1194]: time="2025-05-10T00:50:44.645413987Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/92a2ed2e92fdb136b1f6a1c9260170f54d981aede5f8961c791ad933a3d77f27 pid=2389 runtime=io.containerd.runc.v2 May 10 00:50:44.646085 kubelet[1925]: E0510 00:50:44.646062 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.646325 kubelet[1925]: W0510 00:50:44.646304 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.646456 kubelet[1925]: E0510 00:50:44.646439 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.646800 kubelet[1925]: E0510 00:50:44.646785 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.646905 kubelet[1925]: W0510 00:50:44.646888 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.646997 kubelet[1925]: E0510 00:50:44.646979 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.647300 kubelet[1925]: E0510 00:50:44.647286 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.647397 kubelet[1925]: W0510 00:50:44.647381 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.647505 kubelet[1925]: E0510 00:50:44.647490 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.649934 kubelet[1925]: E0510 00:50:44.649903 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.650172 kubelet[1925]: W0510 00:50:44.650143 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.650317 kubelet[1925]: E0510 00:50:44.650294 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.652564 kubelet[1925]: E0510 00:50:44.652531 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.652564 kubelet[1925]: W0510 00:50:44.652561 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.652784 kubelet[1925]: E0510 00:50:44.652591 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.653137 kubelet[1925]: E0510 00:50:44.653115 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.654338 kubelet[1925]: W0510 00:50:44.654309 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.654481 kubelet[1925]: E0510 00:50:44.654465 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.654879 kubelet[1925]: E0510 00:50:44.654857 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.654976 kubelet[1925]: W0510 00:50:44.654961 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.655102 kubelet[1925]: E0510 00:50:44.655086 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.655415 kubelet[1925]: E0510 00:50:44.655394 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.655415 kubelet[1925]: W0510 00:50:44.655412 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.655507 kubelet[1925]: E0510 00:50:44.655426 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.679371 systemd[1]: Started cri-containerd-92a2ed2e92fdb136b1f6a1c9260170f54d981aede5f8961c791ad933a3d77f27.scope. May 10 00:50:44.689445 kubelet[1925]: E0510 00:50:44.689406 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:44.689800 kubelet[1925]: W0510 00:50:44.689761 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:44.689972 kubelet[1925]: E0510 00:50:44.689942 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.713000 audit: BPF prog-id=119 op=LOAD May 10 00:50:44.716000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2389 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:44.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932613265643265393266646231333662316636613163393236303137 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2389 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:44.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932613265643265393266646231333662316636613163393236303137 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit: BPF prog-id=120 op=LOAD May 10 00:50:44.716000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003acf20 items=0 ppid=2389 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:44.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932613265643265393266646231333662316636613163393236303137 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit: BPF prog-id=121 op=LOAD May 10 00:50:44.716000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003acf68 items=0 ppid=2389 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:44.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932613265643265393266646231333662316636613163393236303137 May 10 00:50:44.716000 audit: BPF prog-id=121 op=UNLOAD May 10 00:50:44.716000 audit: BPF prog-id=120 op=UNLOAD May 10 00:50:44.716000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.716000 audit: BPF prog-id=122 op=LOAD May 10 00:50:44.716000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ad378 items=0 ppid=2389 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:44.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932613265643265393266646231333662316636613163393236303137 May 10 00:50:44.735198 env[1194]: time="2025-05-10T00:50:44.735146130Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-plfvd,Uid:a33a97ca-add2-482d-9745-1f3481765bd1,Namespace:calico-system,Attempt:0,} returns sandbox id \"92a2ed2e92fdb136b1f6a1c9260170f54d981aede5f8961c791ad933a3d77f27\"" May 10 00:50:44.736968 kubelet[1925]: E0510 00:50:44.736348 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:44.915000 audit[2450]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2450 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:44.915000 audit[2450]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffeb6610de0 a2=0 a3=7ffeb6610dcc items=0 ppid=2058 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:44.915000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:44.921000 audit[2450]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2450 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:44.921000 audit[2450]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffeb6610de0 a2=0 a3=0 items=0 ppid=2058 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:44.921000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:44.982984 kubelet[1925]: E0510 00:50:44.982934 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:45.028271 kubelet[1925]: E0510 00:50:45.028234 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.028551 kubelet[1925]: W0510 00:50:45.028525 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.032469 kubelet[1925]: E0510 00:50:45.032358 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.033186 kubelet[1925]: E0510 00:50:45.033156 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.033389 kubelet[1925]: W0510 00:50:45.033363 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.033533 kubelet[1925]: E0510 00:50:45.033513 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.034028 kubelet[1925]: E0510 00:50:45.034005 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.034175 kubelet[1925]: W0510 00:50:45.034152 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.034413 kubelet[1925]: E0510 00:50:45.034392 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.034875 kubelet[1925]: E0510 00:50:45.034856 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.034997 kubelet[1925]: W0510 00:50:45.034977 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.035112 kubelet[1925]: E0510 00:50:45.035095 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.035605 kubelet[1925]: E0510 00:50:45.035587 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.035785 kubelet[1925]: W0510 00:50:45.035762 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.035896 kubelet[1925]: E0510 00:50:45.035876 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.036314 kubelet[1925]: E0510 00:50:45.036295 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.036444 kubelet[1925]: W0510 00:50:45.036425 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.036553 kubelet[1925]: E0510 00:50:45.036537 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.036914 kubelet[1925]: E0510 00:50:45.036896 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.037040 kubelet[1925]: W0510 00:50:45.037022 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.037145 kubelet[1925]: E0510 00:50:45.037127 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.037458 kubelet[1925]: E0510 00:50:45.037442 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.037576 kubelet[1925]: W0510 00:50:45.037558 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.037710 kubelet[1925]: E0510 00:50:45.037684 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.038167 kubelet[1925]: E0510 00:50:45.038148 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.038301 kubelet[1925]: W0510 00:50:45.038281 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.038431 kubelet[1925]: E0510 00:50:45.038408 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.038849 kubelet[1925]: E0510 00:50:45.038830 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.038965 kubelet[1925]: W0510 00:50:45.038946 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.039070 kubelet[1925]: E0510 00:50:45.039053 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.039396 kubelet[1925]: E0510 00:50:45.039379 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.039508 kubelet[1925]: W0510 00:50:45.039491 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.039746 kubelet[1925]: E0510 00:50:45.039723 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.040156 kubelet[1925]: E0510 00:50:45.040137 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.040280 kubelet[1925]: W0510 00:50:45.040262 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.040380 kubelet[1925]: E0510 00:50:45.040362 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.040814 kubelet[1925]: E0510 00:50:45.040795 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.040925 kubelet[1925]: W0510 00:50:45.040905 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.041050 kubelet[1925]: E0510 00:50:45.041031 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.041401 kubelet[1925]: E0510 00:50:45.041383 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.041508 kubelet[1925]: W0510 00:50:45.041489 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.041611 kubelet[1925]: E0510 00:50:45.041594 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.042011 kubelet[1925]: E0510 00:50:45.041993 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.042130 kubelet[1925]: W0510 00:50:45.042113 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.042232 kubelet[1925]: E0510 00:50:45.042216 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.042569 kubelet[1925]: E0510 00:50:45.042552 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.042744 kubelet[1925]: W0510 00:50:45.042721 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.042843 kubelet[1925]: E0510 00:50:45.042825 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.043200 kubelet[1925]: E0510 00:50:45.043182 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.043322 kubelet[1925]: W0510 00:50:45.043305 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.043462 kubelet[1925]: E0510 00:50:45.043443 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.043805 kubelet[1925]: E0510 00:50:45.043789 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.043911 kubelet[1925]: W0510 00:50:45.043892 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.044043 kubelet[1925]: E0510 00:50:45.044006 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.044364 kubelet[1925]: E0510 00:50:45.044348 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.044507 kubelet[1925]: W0510 00:50:45.044490 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.044616 kubelet[1925]: E0510 00:50:45.044598 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.045084 kubelet[1925]: E0510 00:50:45.045043 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.045235 kubelet[1925]: W0510 00:50:45.045215 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.045340 kubelet[1925]: E0510 00:50:45.045323 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.045714 kubelet[1925]: E0510 00:50:45.045697 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.045838 kubelet[1925]: W0510 00:50:45.045821 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.045946 kubelet[1925]: E0510 00:50:45.045928 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.046290 kubelet[1925]: E0510 00:50:45.046273 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.046418 kubelet[1925]: W0510 00:50:45.046400 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.046517 kubelet[1925]: E0510 00:50:45.046501 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.046895 kubelet[1925]: E0510 00:50:45.046876 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.047011 kubelet[1925]: W0510 00:50:45.046993 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.047123 kubelet[1925]: E0510 00:50:45.047105 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.047446 kubelet[1925]: E0510 00:50:45.047429 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.047582 kubelet[1925]: W0510 00:50:45.047562 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.047701 kubelet[1925]: E0510 00:50:45.047684 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.048199 kubelet[1925]: E0510 00:50:45.048180 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:45.048329 kubelet[1925]: W0510 00:50:45.048308 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:45.048432 kubelet[1925]: E0510 00:50:45.048414 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:45.224073 systemd[1]: run-containerd-runc-k8s.io-b3e040d877a48b45e8cd4a0b8a74e7114e935085c3c7a4b973a0a3f67b70c45d-runc.7UJdIv.mount: Deactivated successfully. May 10 00:50:45.398363 update_engine[1180]: I0510 00:50:45.397706 1180 update_attempter.cc:509] Updating boot flags... May 10 00:50:46.923552 kubelet[1925]: E0510 00:50:46.921393 1925 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h5n6j" podUID="afb76990-e60f-4e5f-9a6c-3c9209337ad5" May 10 00:50:47.504935 env[1194]: time="2025-05-10T00:50:47.504866801Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:47.506531 env[1194]: time="2025-05-10T00:50:47.506488717Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:47.508151 env[1194]: time="2025-05-10T00:50:47.508085998Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:47.509546 env[1194]: time="2025-05-10T00:50:47.509507275Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:47.509907 env[1194]: time="2025-05-10T00:50:47.509877582Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 10 00:50:47.514434 env[1194]: time="2025-05-10T00:50:47.514370690Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 10 00:50:47.537506 env[1194]: time="2025-05-10T00:50:47.537422025Z" level=info msg="CreateContainer within sandbox \"b3e040d877a48b45e8cd4a0b8a74e7114e935085c3c7a4b973a0a3f67b70c45d\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 10 00:50:47.552533 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2919460491.mount: Deactivated successfully. May 10 00:50:47.558015 env[1194]: time="2025-05-10T00:50:47.557958555Z" level=info msg="CreateContainer within sandbox \"b3e040d877a48b45e8cd4a0b8a74e7114e935085c3c7a4b973a0a3f67b70c45d\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"51e3b0f71ea5235c89aa2544918521ab5ce44d4565b605c540d3d42c06015698\"" May 10 00:50:47.560727 env[1194]: time="2025-05-10T00:50:47.559214883Z" level=info msg="StartContainer for \"51e3b0f71ea5235c89aa2544918521ab5ce44d4565b605c540d3d42c06015698\"" May 10 00:50:47.600540 systemd[1]: Started cri-containerd-51e3b0f71ea5235c89aa2544918521ab5ce44d4565b605c540d3d42c06015698.scope. May 10 00:50:47.625253 kernel: kauditd_printk_skb: 179 callbacks suppressed May 10 00:50:47.625473 kernel: audit: type=1400 audit(1746838247.616:979): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.625547 kernel: audit: type=1400 audit(1746838247.616:980): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.629656 kernel: audit: type=1400 audit(1746838247.616:981): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.636975 kernel: audit: type=1400 audit(1746838247.616:982): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.637181 kernel: audit: type=1400 audit(1746838247.616:983): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.643738 kernel: audit: type=1400 audit(1746838247.616:984): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.647037 kernel: audit: type=1400 audit(1746838247.616:985): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.654698 kernel: audit: type=1400 audit(1746838247.616:986): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.657646 kernel: audit: type=1400 audit(1746838247.616:987): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.620000 audit: BPF prog-id=123 op=LOAD May 10 00:50:47.620000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.661744 kernel: audit: type=1400 audit(1746838247.620:988): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.620000 audit[2502]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2310 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531653362306637316561353233356338396161323534343931383532 May 10 00:50:47.620000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.620000 audit[2502]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2310 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531653362306637316561353233356338396161323534343931383532 May 10 00:50:47.620000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.620000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.620000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.620000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.620000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.620000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.620000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.620000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.620000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.620000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.620000 audit: BPF prog-id=124 op=LOAD May 10 00:50:47.620000 audit[2502]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003a7640 items=0 ppid=2310 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531653362306637316561353233356338396161323534343931383532 May 10 00:50:47.624000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.624000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.624000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.624000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.624000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.624000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.624000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.624000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.624000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.624000 audit: BPF prog-id=125 op=LOAD May 10 00:50:47.624000 audit[2502]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003a7688 items=0 ppid=2310 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531653362306637316561353233356338396161323534343931383532 May 10 00:50:47.624000 audit: BPF prog-id=125 op=UNLOAD May 10 00:50:47.624000 audit: BPF prog-id=124 op=UNLOAD May 10 00:50:47.624000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.624000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.624000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.624000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.624000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.624000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.624000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.624000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.624000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.624000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.624000 audit: BPF prog-id=126 op=LOAD May 10 00:50:47.624000 audit[2502]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003a7a98 items=0 ppid=2310 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531653362306637316561353233356338396161323534343931383532 May 10 00:50:47.691658 env[1194]: time="2025-05-10T00:50:47.688689648Z" level=info msg="StartContainer for \"51e3b0f71ea5235c89aa2544918521ab5ce44d4565b605c540d3d42c06015698\" returns successfully" May 10 00:50:48.037181 kubelet[1925]: E0510 00:50:48.036506 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:48.071690 kubelet[1925]: E0510 00:50:48.071584 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.071690 kubelet[1925]: W0510 00:50:48.071633 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.071690 kubelet[1925]: E0510 00:50:48.071658 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.073039 kubelet[1925]: E0510 00:50:48.072986 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.073039 kubelet[1925]: W0510 00:50:48.073024 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.073039 kubelet[1925]: E0510 00:50:48.073070 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.073460 kubelet[1925]: E0510 00:50:48.073427 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.073602 kubelet[1925]: W0510 00:50:48.073467 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.073602 kubelet[1925]: E0510 00:50:48.073490 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.073775 kubelet[1925]: E0510 00:50:48.073757 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.073775 kubelet[1925]: W0510 00:50:48.073769 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.073882 kubelet[1925]: E0510 00:50:48.073783 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.074078 kubelet[1925]: E0510 00:50:48.074058 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.074078 kubelet[1925]: W0510 00:50:48.074073 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.074170 kubelet[1925]: E0510 00:50:48.074085 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.074270 kubelet[1925]: E0510 00:50:48.074258 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.074270 kubelet[1925]: W0510 00:50:48.074269 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.074409 kubelet[1925]: E0510 00:50:48.074277 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.074444 kubelet[1925]: E0510 00:50:48.074435 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.074444 kubelet[1925]: W0510 00:50:48.074441 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.074505 kubelet[1925]: E0510 00:50:48.074449 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.074611 kubelet[1925]: E0510 00:50:48.074599 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.074611 kubelet[1925]: W0510 00:50:48.074609 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.074766 kubelet[1925]: E0510 00:50:48.074617 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.074858 kubelet[1925]: E0510 00:50:48.074846 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.074858 kubelet[1925]: W0510 00:50:48.074856 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.074943 kubelet[1925]: E0510 00:50:48.074864 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.075396 kubelet[1925]: E0510 00:50:48.075374 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.075396 kubelet[1925]: W0510 00:50:48.075392 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.075512 kubelet[1925]: E0510 00:50:48.075404 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.075687 kubelet[1925]: E0510 00:50:48.075669 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.075687 kubelet[1925]: W0510 00:50:48.075683 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.075779 kubelet[1925]: E0510 00:50:48.075695 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.075888 kubelet[1925]: E0510 00:50:48.075876 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.075888 kubelet[1925]: W0510 00:50:48.075887 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.075965 kubelet[1925]: E0510 00:50:48.075895 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.076189 kubelet[1925]: E0510 00:50:48.076149 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.076189 kubelet[1925]: W0510 00:50:48.076163 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.076189 kubelet[1925]: E0510 00:50:48.076177 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.076413 kubelet[1925]: E0510 00:50:48.076339 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.076413 kubelet[1925]: W0510 00:50:48.076346 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.076413 kubelet[1925]: E0510 00:50:48.076354 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.076501 kubelet[1925]: E0510 00:50:48.076493 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.076540 kubelet[1925]: W0510 00:50:48.076501 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.076540 kubelet[1925]: E0510 00:50:48.076509 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.076823 kubelet[1925]: E0510 00:50:48.076791 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.076823 kubelet[1925]: W0510 00:50:48.076800 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.076823 kubelet[1925]: E0510 00:50:48.076808 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.077175 kubelet[1925]: E0510 00:50:48.077022 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.077175 kubelet[1925]: W0510 00:50:48.077039 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.077175 kubelet[1925]: E0510 00:50:48.077052 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.077486 kubelet[1925]: E0510 00:50:48.077352 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.077486 kubelet[1925]: W0510 00:50:48.077368 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.077486 kubelet[1925]: E0510 00:50:48.077387 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.077865 kubelet[1925]: E0510 00:50:48.077721 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.077865 kubelet[1925]: W0510 00:50:48.077733 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.077865 kubelet[1925]: E0510 00:50:48.077751 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.078160 kubelet[1925]: E0510 00:50:48.078059 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.078160 kubelet[1925]: W0510 00:50:48.078070 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.078281 kubelet[1925]: E0510 00:50:48.078089 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.078351 kubelet[1925]: E0510 00:50:48.078334 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.078351 kubelet[1925]: W0510 00:50:48.078349 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.078426 kubelet[1925]: E0510 00:50:48.078367 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.078593 kubelet[1925]: E0510 00:50:48.078581 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.078593 kubelet[1925]: W0510 00:50:48.078592 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.078879 kubelet[1925]: E0510 00:50:48.078733 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.078879 kubelet[1925]: E0510 00:50:48.078745 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.078879 kubelet[1925]: W0510 00:50:48.078768 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.078879 kubelet[1925]: E0510 00:50:48.078815 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.079604 kubelet[1925]: E0510 00:50:48.079194 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.079604 kubelet[1925]: W0510 00:50:48.079206 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.079604 kubelet[1925]: E0510 00:50:48.079228 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.079604 kubelet[1925]: E0510 00:50:48.079472 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.079604 kubelet[1925]: W0510 00:50:48.079483 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.079604 kubelet[1925]: E0510 00:50:48.079495 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.079831 kubelet[1925]: E0510 00:50:48.079663 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.079831 kubelet[1925]: W0510 00:50:48.079670 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.079831 kubelet[1925]: E0510 00:50:48.079678 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.079956 kubelet[1925]: E0510 00:50:48.079849 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.079956 kubelet[1925]: W0510 00:50:48.079856 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.079956 kubelet[1925]: E0510 00:50:48.079863 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.080311 kubelet[1925]: E0510 00:50:48.080293 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.080311 kubelet[1925]: W0510 00:50:48.080307 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.080452 kubelet[1925]: E0510 00:50:48.080408 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.080452 kubelet[1925]: E0510 00:50:48.080450 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.080581 kubelet[1925]: W0510 00:50:48.080457 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.080581 kubelet[1925]: E0510 00:50:48.080502 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.080744 kubelet[1925]: E0510 00:50:48.080727 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.080744 kubelet[1925]: W0510 00:50:48.080741 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.080830 kubelet[1925]: E0510 00:50:48.080752 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.080934 kubelet[1925]: E0510 00:50:48.080921 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.080934 kubelet[1925]: W0510 00:50:48.080932 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.081008 kubelet[1925]: E0510 00:50:48.080941 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.081198 kubelet[1925]: E0510 00:50:48.081184 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.081198 kubelet[1925]: W0510 00:50:48.081196 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.081341 kubelet[1925]: E0510 00:50:48.081206 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.081513 kubelet[1925]: E0510 00:50:48.081500 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:48.081513 kubelet[1925]: W0510 00:50:48.081511 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:48.081702 kubelet[1925]: E0510 00:50:48.081519 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:48.920146 kubelet[1925]: E0510 00:50:48.920075 1925 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h5n6j" podUID="afb76990-e60f-4e5f-9a6c-3c9209337ad5" May 10 00:50:48.983598 env[1194]: time="2025-05-10T00:50:48.983498435Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:48.986056 env[1194]: time="2025-05-10T00:50:48.986004807Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:48.988572 env[1194]: time="2025-05-10T00:50:48.988498714Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:48.991514 env[1194]: time="2025-05-10T00:50:48.991461216Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:48.993861 env[1194]: time="2025-05-10T00:50:48.993805928Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 10 00:50:48.999397 env[1194]: time="2025-05-10T00:50:48.999295718Z" level=info msg="CreateContainer within sandbox \"92a2ed2e92fdb136b1f6a1c9260170f54d981aede5f8961c791ad933a3d77f27\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:50:49.021540 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3982903681.mount: Deactivated successfully. May 10 00:50:49.023834 env[1194]: time="2025-05-10T00:50:49.023592809Z" level=info msg="CreateContainer within sandbox \"92a2ed2e92fdb136b1f6a1c9260170f54d981aede5f8961c791ad933a3d77f27\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"224405230cb4a040ac7d0e620e5a396e8f8a58d79b871870c1041366af56589b\"" May 10 00:50:49.024667 env[1194]: time="2025-05-10T00:50:49.024603187Z" level=info msg="StartContainer for \"224405230cb4a040ac7d0e620e5a396e8f8a58d79b871870c1041366af56589b\"" May 10 00:50:49.049437 kubelet[1925]: I0510 00:50:49.048984 1925 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:50:49.049437 kubelet[1925]: E0510 00:50:49.049356 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:49.072423 systemd[1]: Started cri-containerd-224405230cb4a040ac7d0e620e5a396e8f8a58d79b871870c1041366af56589b.scope. May 10 00:50:49.083097 kubelet[1925]: E0510 00:50:49.083059 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.083097 kubelet[1925]: W0510 00:50:49.083082 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.083097 kubelet[1925]: E0510 00:50:49.083106 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.083355 kubelet[1925]: E0510 00:50:49.083288 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.083355 kubelet[1925]: W0510 00:50:49.083296 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.083355 kubelet[1925]: E0510 00:50:49.083304 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.083474 kubelet[1925]: E0510 00:50:49.083459 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.083474 kubelet[1925]: W0510 00:50:49.083472 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.083563 kubelet[1925]: E0510 00:50:49.083484 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.083811 kubelet[1925]: E0510 00:50:49.083772 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.083811 kubelet[1925]: W0510 00:50:49.083786 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.083811 kubelet[1925]: E0510 00:50:49.083807 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.084113 kubelet[1925]: E0510 00:50:49.084093 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.084113 kubelet[1925]: W0510 00:50:49.084106 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.084113 kubelet[1925]: E0510 00:50:49.084117 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.084304 kubelet[1925]: E0510 00:50:49.084290 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.084304 kubelet[1925]: W0510 00:50:49.084300 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.084390 kubelet[1925]: E0510 00:50:49.084311 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.084519 kubelet[1925]: E0510 00:50:49.084501 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.084519 kubelet[1925]: W0510 00:50:49.084517 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.084647 kubelet[1925]: E0510 00:50:49.084538 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.084881 kubelet[1925]: E0510 00:50:49.084858 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.084881 kubelet[1925]: W0510 00:50:49.084878 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.084987 kubelet[1925]: E0510 00:50:49.084897 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.085294 kubelet[1925]: E0510 00:50:49.085275 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.085294 kubelet[1925]: W0510 00:50:49.085290 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.085397 kubelet[1925]: E0510 00:50:49.085305 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.085724 kubelet[1925]: E0510 00:50:49.085696 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.085795 kubelet[1925]: W0510 00:50:49.085742 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.085795 kubelet[1925]: E0510 00:50:49.085763 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.086270 kubelet[1925]: E0510 00:50:49.086194 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.086270 kubelet[1925]: W0510 00:50:49.086211 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.086270 kubelet[1925]: E0510 00:50:49.086225 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.086864 kubelet[1925]: E0510 00:50:49.086842 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.086864 kubelet[1925]: W0510 00:50:49.086856 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.086989 kubelet[1925]: E0510 00:50:49.086870 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.088785 kubelet[1925]: E0510 00:50:49.088749 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.088785 kubelet[1925]: W0510 00:50:49.088779 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.088949 kubelet[1925]: E0510 00:50:49.088803 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.089158 kubelet[1925]: E0510 00:50:49.089127 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.089158 kubelet[1925]: W0510 00:50:49.089151 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.089292 kubelet[1925]: E0510 00:50:49.089170 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.090691 kubelet[1925]: E0510 00:50:49.090660 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.090691 kubelet[1925]: W0510 00:50:49.090685 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.090835 kubelet[1925]: E0510 00:50:49.090705 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.091741 kubelet[1925]: E0510 00:50:49.091715 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.091741 kubelet[1925]: W0510 00:50:49.091737 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.091873 kubelet[1925]: E0510 00:50:49.091757 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.092588 kubelet[1925]: E0510 00:50:49.092520 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.092588 kubelet[1925]: W0510 00:50:49.092535 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.092588 kubelet[1925]: E0510 00:50:49.092556 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.092878 kubelet[1925]: E0510 00:50:49.092856 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.092878 kubelet[1925]: W0510 00:50:49.092877 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.092966 kubelet[1925]: E0510 00:50:49.092902 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.093180 kubelet[1925]: E0510 00:50:49.093160 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.093180 kubelet[1925]: W0510 00:50:49.093178 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.093303 kubelet[1925]: E0510 00:50:49.093198 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.093549 kubelet[1925]: E0510 00:50:49.093528 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.093549 kubelet[1925]: W0510 00:50:49.093546 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.093662 kubelet[1925]: E0510 00:50:49.093568 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.093861 kubelet[1925]: E0510 00:50:49.093840 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.093861 kubelet[1925]: W0510 00:50:49.093860 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.093979 kubelet[1925]: E0510 00:50:49.093959 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.094132 kubelet[1925]: E0510 00:50:49.094115 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.094132 kubelet[1925]: W0510 00:50:49.094129 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.094300 kubelet[1925]: E0510 00:50:49.094282 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.094438 kubelet[1925]: E0510 00:50:49.094424 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.094486 kubelet[1925]: W0510 00:50:49.094437 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.094578 kubelet[1925]: E0510 00:50:49.094542 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.094764 kubelet[1925]: E0510 00:50:49.094744 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.094764 kubelet[1925]: W0510 00:50:49.094760 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.094847 kubelet[1925]: E0510 00:50:49.094777 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.095054 kubelet[1925]: E0510 00:50:49.095034 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.095054 kubelet[1925]: W0510 00:50:49.095050 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.095182 kubelet[1925]: E0510 00:50:49.095072 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.095737 kubelet[1925]: E0510 00:50:49.095716 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.095737 kubelet[1925]: W0510 00:50:49.095734 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.095914 kubelet[1925]: E0510 00:50:49.095869 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.095960 kubelet[1925]: E0510 00:50:49.095925 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.095960 kubelet[1925]: W0510 00:50:49.095937 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.096068 kubelet[1925]: E0510 00:50:49.096040 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.096236 kubelet[1925]: E0510 00:50:49.096215 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.096236 kubelet[1925]: W0510 00:50:49.096232 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.096350 kubelet[1925]: E0510 00:50:49.096253 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.096493 kubelet[1925]: E0510 00:50:49.096473 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.096493 kubelet[1925]: W0510 00:50:49.096487 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.096687 kubelet[1925]: E0510 00:50:49.096507 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.096905 kubelet[1925]: E0510 00:50:49.096882 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.096905 kubelet[1925]: W0510 00:50:49.096899 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.097042 kubelet[1925]: E0510 00:50:49.096916 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.097538 kubelet[1925]: E0510 00:50:49.097419 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.097538 kubelet[1925]: W0510 00:50:49.097438 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.097538 kubelet[1925]: E0510 00:50:49.097462 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.098472 kubelet[1925]: E0510 00:50:49.098406 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.098472 kubelet[1925]: W0510 00:50:49.098440 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.098472 kubelet[1925]: E0510 00:50:49.098462 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.100649 kubelet[1925]: E0510 00:50:49.098859 1925 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:49.100649 kubelet[1925]: W0510 00:50:49.098882 1925 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:49.100649 kubelet[1925]: E0510 00:50:49.098898 1925 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:49.112000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.112000 audit[2572]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7ffa9058d708 items=0 ppid=2389 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:49.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232343430353233306362346130343061633764306536323065356133 May 10 00:50:49.112000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.112000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.112000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.112000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.112000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.112000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.112000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.112000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.112000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.112000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.112000 audit: BPF prog-id=127 op=LOAD May 10 00:50:49.112000 audit[2572]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00038e9c8 items=0 ppid=2389 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:49.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232343430353233306362346130343061633764306536323065356133 May 10 00:50:49.113000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.113000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.113000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.113000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.113000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.113000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.113000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.113000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.113000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.113000 audit: BPF prog-id=128 op=LOAD May 10 00:50:49.113000 audit[2572]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00038ea18 items=0 ppid=2389 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:49.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232343430353233306362346130343061633764306536323065356133 May 10 00:50:49.113000 audit: BPF prog-id=128 op=UNLOAD May 10 00:50:49.113000 audit: BPF prog-id=127 op=UNLOAD May 10 00:50:49.113000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.113000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.113000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.113000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.113000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.113000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.113000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.113000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.113000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.113000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.113000 audit: BPF prog-id=129 op=LOAD May 10 00:50:49.113000 audit[2572]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00038eaa8 items=0 ppid=2389 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:49.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232343430353233306362346130343061633764306536323065356133 May 10 00:50:49.137277 env[1194]: time="2025-05-10T00:50:49.137221883Z" level=info msg="StartContainer for \"224405230cb4a040ac7d0e620e5a396e8f8a58d79b871870c1041366af56589b\" returns successfully" May 10 00:50:49.155124 systemd[1]: cri-containerd-224405230cb4a040ac7d0e620e5a396e8f8a58d79b871870c1041366af56589b.scope: Deactivated successfully. May 10 00:50:49.157000 audit: BPF prog-id=129 op=UNLOAD May 10 00:50:49.197705 env[1194]: time="2025-05-10T00:50:49.194802994Z" level=info msg="shim disconnected" id=224405230cb4a040ac7d0e620e5a396e8f8a58d79b871870c1041366af56589b May 10 00:50:49.197705 env[1194]: time="2025-05-10T00:50:49.195714606Z" level=warning msg="cleaning up after shim disconnected" id=224405230cb4a040ac7d0e620e5a396e8f8a58d79b871870c1041366af56589b namespace=k8s.io May 10 00:50:49.197705 env[1194]: time="2025-05-10T00:50:49.195746262Z" level=info msg="cleaning up dead shim" May 10 00:50:49.210956 env[1194]: time="2025-05-10T00:50:49.210903477Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:50:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2643 runtime=io.containerd.runc.v2\n" May 10 00:50:49.524168 systemd[1]: run-containerd-runc-k8s.io-224405230cb4a040ac7d0e620e5a396e8f8a58d79b871870c1041366af56589b-runc.HSBVxd.mount: Deactivated successfully. May 10 00:50:49.524296 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-224405230cb4a040ac7d0e620e5a396e8f8a58d79b871870c1041366af56589b-rootfs.mount: Deactivated successfully. May 10 00:50:50.053896 kubelet[1925]: E0510 00:50:50.053857 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:50.055592 env[1194]: time="2025-05-10T00:50:50.055557554Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 10 00:50:50.076505 kubelet[1925]: I0510 00:50:50.076430 1925 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-66b48db7b8-2jb8x" podStartSLOduration=4.192393519 podStartE2EDuration="7.076387116s" podCreationTimestamp="2025-05-10 00:50:43 +0000 UTC" firstStartedPulling="2025-05-10 00:50:44.628686961 +0000 UTC m=+12.884633008" lastFinishedPulling="2025-05-10 00:50:47.512680471 +0000 UTC m=+15.768626605" observedRunningTime="2025-05-10 00:50:48.06198531 +0000 UTC m=+16.317931390" watchObservedRunningTime="2025-05-10 00:50:50.076387116 +0000 UTC m=+18.332333163" May 10 00:50:50.920399 kubelet[1925]: E0510 00:50:50.920317 1925 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h5n6j" podUID="afb76990-e60f-4e5f-9a6c-3c9209337ad5" May 10 00:50:52.920312 kubelet[1925]: E0510 00:50:52.920231 1925 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h5n6j" podUID="afb76990-e60f-4e5f-9a6c-3c9209337ad5" May 10 00:50:54.602493 env[1194]: time="2025-05-10T00:50:54.602396295Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:54.604309 env[1194]: time="2025-05-10T00:50:54.604241587Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:54.606326 env[1194]: time="2025-05-10T00:50:54.606273762Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:54.607849 env[1194]: time="2025-05-10T00:50:54.607806296Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:54.609038 env[1194]: time="2025-05-10T00:50:54.608991053Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 10 00:50:54.615031 env[1194]: time="2025-05-10T00:50:54.614979472Z" level=info msg="CreateContainer within sandbox \"92a2ed2e92fdb136b1f6a1c9260170f54d981aede5f8961c791ad933a3d77f27\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:50:54.628375 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2952638847.mount: Deactivated successfully. May 10 00:50:54.633732 env[1194]: time="2025-05-10T00:50:54.633647400Z" level=info msg="CreateContainer within sandbox \"92a2ed2e92fdb136b1f6a1c9260170f54d981aede5f8961c791ad933a3d77f27\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"8b68b0d18e34e8415768b857077026277212a848dde4dc7df3da858dba3fca44\"" May 10 00:50:54.636651 env[1194]: time="2025-05-10T00:50:54.636521966Z" level=info msg="StartContainer for \"8b68b0d18e34e8415768b857077026277212a848dde4dc7df3da858dba3fca44\"" May 10 00:50:54.674376 systemd[1]: Started cri-containerd-8b68b0d18e34e8415768b857077026277212a848dde4dc7df3da858dba3fca44.scope. May 10 00:50:54.717559 kernel: kauditd_printk_skb: 91 callbacks suppressed May 10 00:50:54.720950 kernel: audit: type=1400 audit(1746838254.712:1004): avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.721019 kernel: audit: type=1300 audit(1746838254.712:1004): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1f003ecf88 items=0 ppid=2389 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:54.712000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1f003ecf88 items=0 ppid=2389 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:54.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363862306431386533346538343135373638623835373037373032 May 10 00:50:54.726742 kernel: audit: type=1327 audit(1746838254.712:1004): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363862306431386533346538343135373638623835373037373032 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.731674 kernel: audit: type=1400 audit(1746838254.712:1005): avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.731828 kernel: audit: type=1400 audit(1746838254.712:1005): avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.736847 kernel: audit: type=1400 audit(1746838254.712:1005): avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.736985 kernel: audit: type=1400 audit(1746838254.712:1005): avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.743238 kernel: audit: type=1400 audit(1746838254.712:1005): avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.743399 kernel: audit: type=1400 audit(1746838254.712:1005): avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit: BPF prog-id=130 op=LOAD May 10 00:50:54.712000 audit[2668]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001fdbf8 items=0 ppid=2389 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:54.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363862306431386533346538343135373638623835373037373032 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.748674 kernel: audit: type=1400 audit(1746838254.712:1005): avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit: BPF prog-id=131 op=LOAD May 10 00:50:54.712000 audit[2668]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001fdc48 items=0 ppid=2389 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:54.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363862306431386533346538343135373638623835373037373032 May 10 00:50:54.712000 audit: BPF prog-id=131 op=UNLOAD May 10 00:50:54.712000 audit: BPF prog-id=130 op=UNLOAD May 10 00:50:54.712000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:54.712000 audit: BPF prog-id=132 op=LOAD May 10 00:50:54.712000 audit[2668]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001fdcd8 items=0 ppid=2389 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:54.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363862306431386533346538343135373638623835373037373032 May 10 00:50:54.760521 env[1194]: time="2025-05-10T00:50:54.760435192Z" level=info msg="StartContainer for \"8b68b0d18e34e8415768b857077026277212a848dde4dc7df3da858dba3fca44\" returns successfully" May 10 00:50:54.919820 kubelet[1925]: E0510 00:50:54.919662 1925 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h5n6j" podUID="afb76990-e60f-4e5f-9a6c-3c9209337ad5" May 10 00:50:55.069015 kubelet[1925]: E0510 00:50:55.068975 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:55.417595 env[1194]: time="2025-05-10T00:50:55.417520137Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:50:55.421183 systemd[1]: cri-containerd-8b68b0d18e34e8415768b857077026277212a848dde4dc7df3da858dba3fca44.scope: Deactivated successfully. May 10 00:50:55.424000 audit: BPF prog-id=132 op=UNLOAD May 10 00:50:55.452290 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8b68b0d18e34e8415768b857077026277212a848dde4dc7df3da858dba3fca44-rootfs.mount: Deactivated successfully. May 10 00:50:55.457975 env[1194]: time="2025-05-10T00:50:55.457922069Z" level=info msg="shim disconnected" id=8b68b0d18e34e8415768b857077026277212a848dde4dc7df3da858dba3fca44 May 10 00:50:55.458355 env[1194]: time="2025-05-10T00:50:55.458329060Z" level=warning msg="cleaning up after shim disconnected" id=8b68b0d18e34e8415768b857077026277212a848dde4dc7df3da858dba3fca44 namespace=k8s.io May 10 00:50:55.458467 env[1194]: time="2025-05-10T00:50:55.458440121Z" level=info msg="cleaning up dead shim" May 10 00:50:55.469017 env[1194]: time="2025-05-10T00:50:55.468961627Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:50:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2708 runtime=io.containerd.runc.v2\n" May 10 00:50:55.476479 kubelet[1925]: I0510 00:50:55.476148 1925 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 10 00:50:55.524239 systemd[1]: Created slice kubepods-burstable-pod309470cc_1a19_4c2f_ac9a_68ac7d4eb559.slice. May 10 00:50:55.536695 systemd[1]: Created slice kubepods-burstable-pod1ea33208_eaf4_4a7e_b4f4_0abb3d6d89dd.slice. May 10 00:50:55.542918 kubelet[1925]: W0510 00:50:55.542172 1925 reflector.go:569] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.7-n-09020fac35" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.7-n-09020fac35' and this object May 10 00:50:55.543119 kubelet[1925]: E0510 00:50:55.542919 1925 reflector.go:166] "Unhandled Error" err="object-\"calico-apiserver\"/\"calico-apiserver-certs\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"calico-apiserver-certs\" is forbidden: User \"system:node:ci-3510.3.7-n-09020fac35\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-apiserver\": no relationship found between node 'ci-3510.3.7-n-09020fac35' and this object" logger="UnhandledError" May 10 00:50:55.543119 kubelet[1925]: W0510 00:50:55.542290 1925 reflector.go:569] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.7-n-09020fac35" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.7-n-09020fac35' and this object May 10 00:50:55.543119 kubelet[1925]: E0510 00:50:55.542960 1925 reflector.go:166] "Unhandled Error" err="object-\"calico-apiserver\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:ci-3510.3.7-n-09020fac35\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-apiserver\": no relationship found between node 'ci-3510.3.7-n-09020fac35' and this object" logger="UnhandledError" May 10 00:50:55.546455 systemd[1]: Created slice kubepods-besteffort-pod505cbb42_c217_49c3_a63b_83b244af8ef9.slice. May 10 00:50:55.555731 systemd[1]: Created slice kubepods-besteffort-pod95aa6a47_b095_4d76_97b3_94e677b65c1b.slice. May 10 00:50:55.559878 systemd[1]: Created slice kubepods-besteffort-pod4c30e8b1_96d4_49c5_bb53_9f29c6d5985e.slice. May 10 00:50:55.574789 kubelet[1925]: I0510 00:50:55.574740 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f5xtc\" (UniqueName: \"kubernetes.io/projected/1ea33208-eaf4-4a7e-b4f4-0abb3d6d89dd-kube-api-access-f5xtc\") pod \"coredns-668d6bf9bc-vlx8n\" (UID: \"1ea33208-eaf4-4a7e-b4f4-0abb3d6d89dd\") " pod="kube-system/coredns-668d6bf9bc-vlx8n" May 10 00:50:55.575110 kubelet[1925]: I0510 00:50:55.575072 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/505cbb42-c217-49c3-a63b-83b244af8ef9-tigera-ca-bundle\") pod \"calico-kube-controllers-9d5ccc654-s8r27\" (UID: \"505cbb42-c217-49c3-a63b-83b244af8ef9\") " pod="calico-system/calico-kube-controllers-9d5ccc654-s8r27" May 10 00:50:55.575300 kubelet[1925]: I0510 00:50:55.575282 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-87x59\" (UniqueName: \"kubernetes.io/projected/309470cc-1a19-4c2f-ac9a-68ac7d4eb559-kube-api-access-87x59\") pod \"coredns-668d6bf9bc-8729n\" (UID: \"309470cc-1a19-4c2f-ac9a-68ac7d4eb559\") " pod="kube-system/coredns-668d6bf9bc-8729n" May 10 00:50:55.575509 kubelet[1925]: I0510 00:50:55.575472 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mxrvw\" (UniqueName: \"kubernetes.io/projected/505cbb42-c217-49c3-a63b-83b244af8ef9-kube-api-access-mxrvw\") pod \"calico-kube-controllers-9d5ccc654-s8r27\" (UID: \"505cbb42-c217-49c3-a63b-83b244af8ef9\") " pod="calico-system/calico-kube-controllers-9d5ccc654-s8r27" May 10 00:50:55.575723 kubelet[1925]: I0510 00:50:55.575696 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k67tm\" (UniqueName: \"kubernetes.io/projected/95aa6a47-b095-4d76-97b3-94e677b65c1b-kube-api-access-k67tm\") pod \"calico-apiserver-54f5dc6b49-2fhw9\" (UID: \"95aa6a47-b095-4d76-97b3-94e677b65c1b\") " pod="calico-apiserver/calico-apiserver-54f5dc6b49-2fhw9" May 10 00:50:55.575852 kubelet[1925]: I0510 00:50:55.575838 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/4c30e8b1-96d4-49c5-bb53-9f29c6d5985e-calico-apiserver-certs\") pod \"calico-apiserver-54f5dc6b49-sst45\" (UID: \"4c30e8b1-96d4-49c5-bb53-9f29c6d5985e\") " pod="calico-apiserver/calico-apiserver-54f5dc6b49-sst45" May 10 00:50:55.575976 kubelet[1925]: I0510 00:50:55.575956 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t4dhj\" (UniqueName: \"kubernetes.io/projected/4c30e8b1-96d4-49c5-bb53-9f29c6d5985e-kube-api-access-t4dhj\") pod \"calico-apiserver-54f5dc6b49-sst45\" (UID: \"4c30e8b1-96d4-49c5-bb53-9f29c6d5985e\") " pod="calico-apiserver/calico-apiserver-54f5dc6b49-sst45" May 10 00:50:55.576180 kubelet[1925]: I0510 00:50:55.576163 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/95aa6a47-b095-4d76-97b3-94e677b65c1b-calico-apiserver-certs\") pod \"calico-apiserver-54f5dc6b49-2fhw9\" (UID: \"95aa6a47-b095-4d76-97b3-94e677b65c1b\") " pod="calico-apiserver/calico-apiserver-54f5dc6b49-2fhw9" May 10 00:50:55.576296 kubelet[1925]: I0510 00:50:55.576282 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/1ea33208-eaf4-4a7e-b4f4-0abb3d6d89dd-config-volume\") pod \"coredns-668d6bf9bc-vlx8n\" (UID: \"1ea33208-eaf4-4a7e-b4f4-0abb3d6d89dd\") " pod="kube-system/coredns-668d6bf9bc-vlx8n" May 10 00:50:55.576403 kubelet[1925]: I0510 00:50:55.576390 1925 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/309470cc-1a19-4c2f-ac9a-68ac7d4eb559-config-volume\") pod \"coredns-668d6bf9bc-8729n\" (UID: \"309470cc-1a19-4c2f-ac9a-68ac7d4eb559\") " pod="kube-system/coredns-668d6bf9bc-8729n" May 10 00:50:55.829582 kubelet[1925]: E0510 00:50:55.829536 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:55.830889 env[1194]: time="2025-05-10T00:50:55.830828230Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-8729n,Uid:309470cc-1a19-4c2f-ac9a-68ac7d4eb559,Namespace:kube-system,Attempt:0,}" May 10 00:50:55.851339 kubelet[1925]: E0510 00:50:55.851140 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:55.852724 env[1194]: time="2025-05-10T00:50:55.852564072Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-vlx8n,Uid:1ea33208-eaf4-4a7e-b4f4-0abb3d6d89dd,Namespace:kube-system,Attempt:0,}" May 10 00:50:55.855023 env[1194]: time="2025-05-10T00:50:55.854957969Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-9d5ccc654-s8r27,Uid:505cbb42-c217-49c3-a63b-83b244af8ef9,Namespace:calico-system,Attempt:0,}" May 10 00:50:56.051188 env[1194]: time="2025-05-10T00:50:56.051089700Z" level=error msg="Failed to destroy network for sandbox \"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:56.051824 env[1194]: time="2025-05-10T00:50:56.051780746Z" level=error msg="encountered an error cleaning up failed sandbox \"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:56.052041 env[1194]: time="2025-05-10T00:50:56.051978844Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-vlx8n,Uid:1ea33208-eaf4-4a7e-b4f4-0abb3d6d89dd,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:56.052571 kubelet[1925]: E0510 00:50:56.052402 1925 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:56.053448 kubelet[1925]: E0510 00:50:56.053255 1925 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-vlx8n" May 10 00:50:56.053448 kubelet[1925]: E0510 00:50:56.053324 1925 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-vlx8n" May 10 00:50:56.053448 kubelet[1925]: E0510 00:50:56.053386 1925 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-vlx8n_kube-system(1ea33208-eaf4-4a7e-b4f4-0abb3d6d89dd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-vlx8n_kube-system(1ea33208-eaf4-4a7e-b4f4-0abb3d6d89dd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-vlx8n" podUID="1ea33208-eaf4-4a7e-b4f4-0abb3d6d89dd" May 10 00:50:56.072773 kubelet[1925]: E0510 00:50:56.072733 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:56.086346 env[1194]: time="2025-05-10T00:50:56.084942206Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 10 00:50:56.086479 kubelet[1925]: I0510 00:50:56.086164 1925 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" May 10 00:50:56.086852 env[1194]: time="2025-05-10T00:50:56.086808998Z" level=info msg="StopPodSandbox for \"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\"" May 10 00:50:56.099488 env[1194]: time="2025-05-10T00:50:56.099427781Z" level=error msg="Failed to destroy network for sandbox \"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:56.100143 env[1194]: time="2025-05-10T00:50:56.100093633Z" level=error msg="encountered an error cleaning up failed sandbox \"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:56.100339 env[1194]: time="2025-05-10T00:50:56.100309005Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-9d5ccc654-s8r27,Uid:505cbb42-c217-49c3-a63b-83b244af8ef9,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:56.100860 kubelet[1925]: E0510 00:50:56.100646 1925 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:56.100860 kubelet[1925]: E0510 00:50:56.100709 1925 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-9d5ccc654-s8r27" May 10 00:50:56.100860 kubelet[1925]: E0510 00:50:56.100737 1925 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-9d5ccc654-s8r27" May 10 00:50:56.101068 kubelet[1925]: E0510 00:50:56.100800 1925 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-9d5ccc654-s8r27_calico-system(505cbb42-c217-49c3-a63b-83b244af8ef9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-9d5ccc654-s8r27_calico-system(505cbb42-c217-49c3-a63b-83b244af8ef9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-9d5ccc654-s8r27" podUID="505cbb42-c217-49c3-a63b-83b244af8ef9" May 10 00:50:56.130798 env[1194]: time="2025-05-10T00:50:56.130705002Z" level=error msg="Failed to destroy network for sandbox \"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:56.131417 env[1194]: time="2025-05-10T00:50:56.131358832Z" level=error msg="encountered an error cleaning up failed sandbox \"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:56.131600 env[1194]: time="2025-05-10T00:50:56.131566897Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-8729n,Uid:309470cc-1a19-4c2f-ac9a-68ac7d4eb559,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:56.132010 kubelet[1925]: E0510 00:50:56.131942 1925 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:56.132112 kubelet[1925]: E0510 00:50:56.132060 1925 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-8729n" May 10 00:50:56.132112 kubelet[1925]: E0510 00:50:56.132088 1925 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-8729n" May 10 00:50:56.132198 kubelet[1925]: E0510 00:50:56.132167 1925 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-8729n_kube-system(309470cc-1a19-4c2f-ac9a-68ac7d4eb559)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-8729n_kube-system(309470cc-1a19-4c2f-ac9a-68ac7d4eb559)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-8729n" podUID="309470cc-1a19-4c2f-ac9a-68ac7d4eb559" May 10 00:50:56.152486 env[1194]: time="2025-05-10T00:50:56.152364618Z" level=error msg="StopPodSandbox for \"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\" failed" error="failed to destroy network for sandbox \"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:56.153365 kubelet[1925]: E0510 00:50:56.153053 1925 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" May 10 00:50:56.153365 kubelet[1925]: E0510 00:50:56.153177 1925 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f"} May 10 00:50:56.153365 kubelet[1925]: E0510 00:50:56.153272 1925 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1ea33208-eaf4-4a7e-b4f4-0abb3d6d89dd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:56.153365 kubelet[1925]: E0510 00:50:56.153320 1925 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1ea33208-eaf4-4a7e-b4f4-0abb3d6d89dd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-vlx8n" podUID="1ea33208-eaf4-4a7e-b4f4-0abb3d6d89dd" May 10 00:50:56.699359 kubelet[1925]: E0510 00:50:56.699292 1925 projected.go:288] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition May 10 00:50:56.699718 kubelet[1925]: E0510 00:50:56.699687 1925 projected.go:194] Error preparing data for projected volume kube-api-access-k67tm for pod calico-apiserver/calico-apiserver-54f5dc6b49-2fhw9: failed to sync configmap cache: timed out waiting for the condition May 10 00:50:56.699964 kubelet[1925]: E0510 00:50:56.699946 1925 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/95aa6a47-b095-4d76-97b3-94e677b65c1b-kube-api-access-k67tm podName:95aa6a47-b095-4d76-97b3-94e677b65c1b nodeName:}" failed. No retries permitted until 2025-05-10 00:50:57.199913677 +0000 UTC m=+25.455859725 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-k67tm" (UniqueName: "kubernetes.io/projected/95aa6a47-b095-4d76-97b3-94e677b65c1b-kube-api-access-k67tm") pod "calico-apiserver-54f5dc6b49-2fhw9" (UID: "95aa6a47-b095-4d76-97b3-94e677b65c1b") : failed to sync configmap cache: timed out waiting for the condition May 10 00:50:56.713000 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94-shm.mount: Deactivated successfully. May 10 00:50:56.713582 kubelet[1925]: E0510 00:50:56.713551 1925 projected.go:288] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition May 10 00:50:56.713737 kubelet[1925]: E0510 00:50:56.713719 1925 projected.go:194] Error preparing data for projected volume kube-api-access-t4dhj for pod calico-apiserver/calico-apiserver-54f5dc6b49-sst45: failed to sync configmap cache: timed out waiting for the condition May 10 00:50:56.713936 kubelet[1925]: E0510 00:50:56.713919 1925 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/4c30e8b1-96d4-49c5-bb53-9f29c6d5985e-kube-api-access-t4dhj podName:4c30e8b1-96d4-49c5-bb53-9f29c6d5985e nodeName:}" failed. No retries permitted until 2025-05-10 00:50:57.213898731 +0000 UTC m=+25.469844769 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-t4dhj" (UniqueName: "kubernetes.io/projected/4c30e8b1-96d4-49c5-bb53-9f29c6d5985e-kube-api-access-t4dhj") pod "calico-apiserver-54f5dc6b49-sst45" (UID: "4c30e8b1-96d4-49c5-bb53-9f29c6d5985e") : failed to sync configmap cache: timed out waiting for the condition May 10 00:50:56.924933 systemd[1]: Created slice kubepods-besteffort-podafb76990_e60f_4e5f_9a6c_3c9209337ad5.slice. May 10 00:50:56.927820 env[1194]: time="2025-05-10T00:50:56.927448262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h5n6j,Uid:afb76990-e60f-4e5f-9a6c-3c9209337ad5,Namespace:calico-system,Attempt:0,}" May 10 00:50:57.004113 env[1194]: time="2025-05-10T00:50:57.003954744Z" level=error msg="Failed to destroy network for sandbox \"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:57.008310 env[1194]: time="2025-05-10T00:50:57.008177758Z" level=error msg="encountered an error cleaning up failed sandbox \"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:57.008310 env[1194]: time="2025-05-10T00:50:57.008292213Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h5n6j,Uid:afb76990-e60f-4e5f-9a6c-3c9209337ad5,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:57.006844 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620-shm.mount: Deactivated successfully. May 10 00:50:57.008650 kubelet[1925]: E0510 00:50:57.008573 1925 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:57.008726 kubelet[1925]: E0510 00:50:57.008680 1925 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-h5n6j" May 10 00:50:57.008726 kubelet[1925]: E0510 00:50:57.008714 1925 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-h5n6j" May 10 00:50:57.011089 kubelet[1925]: E0510 00:50:57.008788 1925 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-h5n6j_calico-system(afb76990-e60f-4e5f-9a6c-3c9209337ad5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-h5n6j_calico-system(afb76990-e60f-4e5f-9a6c-3c9209337ad5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-h5n6j" podUID="afb76990-e60f-4e5f-9a6c-3c9209337ad5" May 10 00:50:57.089432 kubelet[1925]: I0510 00:50:57.089398 1925 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" May 10 00:50:57.091707 env[1194]: time="2025-05-10T00:50:57.090172913Z" level=info msg="StopPodSandbox for \"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\"" May 10 00:50:57.091926 kubelet[1925]: I0510 00:50:57.091422 1925 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" May 10 00:50:57.092011 env[1194]: time="2025-05-10T00:50:57.091930915Z" level=info msg="StopPodSandbox for \"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\"" May 10 00:50:57.093908 kubelet[1925]: I0510 00:50:57.093256 1925 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" May 10 00:50:57.094065 env[1194]: time="2025-05-10T00:50:57.093670297Z" level=info msg="StopPodSandbox for \"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\"" May 10 00:50:57.181116 env[1194]: time="2025-05-10T00:50:57.181033617Z" level=error msg="StopPodSandbox for \"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\" failed" error="failed to destroy network for sandbox \"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:57.182019 kubelet[1925]: E0510 00:50:57.181947 1925 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" May 10 00:50:57.182224 kubelet[1925]: E0510 00:50:57.182036 1925 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620"} May 10 00:50:57.182224 kubelet[1925]: E0510 00:50:57.182124 1925 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"afb76990-e60f-4e5f-9a6c-3c9209337ad5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:57.182224 kubelet[1925]: E0510 00:50:57.182183 1925 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"afb76990-e60f-4e5f-9a6c-3c9209337ad5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-h5n6j" podUID="afb76990-e60f-4e5f-9a6c-3c9209337ad5" May 10 00:50:57.189204 env[1194]: time="2025-05-10T00:50:57.189110093Z" level=error msg="StopPodSandbox for \"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\" failed" error="failed to destroy network for sandbox \"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:57.189559 kubelet[1925]: E0510 00:50:57.189497 1925 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" May 10 00:50:57.189711 kubelet[1925]: E0510 00:50:57.189598 1925 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94"} May 10 00:50:57.189711 kubelet[1925]: E0510 00:50:57.189680 1925 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"309470cc-1a19-4c2f-ac9a-68ac7d4eb559\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:57.189907 kubelet[1925]: E0510 00:50:57.189732 1925 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"309470cc-1a19-4c2f-ac9a-68ac7d4eb559\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-8729n" podUID="309470cc-1a19-4c2f-ac9a-68ac7d4eb559" May 10 00:50:57.197134 env[1194]: time="2025-05-10T00:50:57.197054890Z" level=error msg="StopPodSandbox for \"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\" failed" error="failed to destroy network for sandbox \"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:57.197425 kubelet[1925]: E0510 00:50:57.197343 1925 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" May 10 00:50:57.197425 kubelet[1925]: E0510 00:50:57.197408 1925 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb"} May 10 00:50:57.197589 kubelet[1925]: E0510 00:50:57.197451 1925 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"505cbb42-c217-49c3-a63b-83b244af8ef9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:57.197589 kubelet[1925]: E0510 00:50:57.197480 1925 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"505cbb42-c217-49c3-a63b-83b244af8ef9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-9d5ccc654-s8r27" podUID="505cbb42-c217-49c3-a63b-83b244af8ef9" May 10 00:50:57.361776 env[1194]: time="2025-05-10T00:50:57.360481463Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54f5dc6b49-2fhw9,Uid:95aa6a47-b095-4d76-97b3-94e677b65c1b,Namespace:calico-apiserver,Attempt:0,}" May 10 00:50:57.376047 env[1194]: time="2025-05-10T00:50:57.375940325Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54f5dc6b49-sst45,Uid:4c30e8b1-96d4-49c5-bb53-9f29c6d5985e,Namespace:calico-apiserver,Attempt:0,}" May 10 00:50:57.514448 env[1194]: time="2025-05-10T00:50:57.514383210Z" level=error msg="Failed to destroy network for sandbox \"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:57.515288 env[1194]: time="2025-05-10T00:50:57.515216675Z" level=error msg="encountered an error cleaning up failed sandbox \"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:57.515555 env[1194]: time="2025-05-10T00:50:57.515509557Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54f5dc6b49-2fhw9,Uid:95aa6a47-b095-4d76-97b3-94e677b65c1b,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:57.517225 kubelet[1925]: E0510 00:50:57.515948 1925 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:57.517225 kubelet[1925]: E0510 00:50:57.516081 1925 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-54f5dc6b49-2fhw9" May 10 00:50:57.517225 kubelet[1925]: E0510 00:50:57.516116 1925 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-54f5dc6b49-2fhw9" May 10 00:50:57.517452 kubelet[1925]: E0510 00:50:57.516167 1925 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-54f5dc6b49-2fhw9_calico-apiserver(95aa6a47-b095-4d76-97b3-94e677b65c1b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-54f5dc6b49-2fhw9_calico-apiserver(95aa6a47-b095-4d76-97b3-94e677b65c1b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-54f5dc6b49-2fhw9" podUID="95aa6a47-b095-4d76-97b3-94e677b65c1b" May 10 00:50:57.552387 env[1194]: time="2025-05-10T00:50:57.552293881Z" level=error msg="Failed to destroy network for sandbox \"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:57.552749 env[1194]: time="2025-05-10T00:50:57.552711830Z" level=error msg="encountered an error cleaning up failed sandbox \"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:57.552854 env[1194]: time="2025-05-10T00:50:57.552776893Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54f5dc6b49-sst45,Uid:4c30e8b1-96d4-49c5-bb53-9f29c6d5985e,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:57.554320 kubelet[1925]: E0510 00:50:57.553118 1925 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:57.554320 kubelet[1925]: E0510 00:50:57.553202 1925 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-54f5dc6b49-sst45" May 10 00:50:57.554320 kubelet[1925]: E0510 00:50:57.553227 1925 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-54f5dc6b49-sst45" May 10 00:50:57.554575 kubelet[1925]: E0510 00:50:57.553266 1925 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-54f5dc6b49-sst45_calico-apiserver(4c30e8b1-96d4-49c5-bb53-9f29c6d5985e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-54f5dc6b49-sst45_calico-apiserver(4c30e8b1-96d4-49c5-bb53-9f29c6d5985e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-54f5dc6b49-sst45" podUID="4c30e8b1-96d4-49c5-bb53-9f29c6d5985e" May 10 00:50:58.096125 kubelet[1925]: I0510 00:50:58.096086 1925 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" May 10 00:50:58.096819 env[1194]: time="2025-05-10T00:50:58.096774911Z" level=info msg="StopPodSandbox for \"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\"" May 10 00:50:58.112666 kubelet[1925]: I0510 00:50:58.112114 1925 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" May 10 00:50:58.113842 env[1194]: time="2025-05-10T00:50:58.113804850Z" level=info msg="StopPodSandbox for \"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\"" May 10 00:50:58.158885 env[1194]: time="2025-05-10T00:50:58.158808264Z" level=error msg="StopPodSandbox for \"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\" failed" error="failed to destroy network for sandbox \"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:58.159550 kubelet[1925]: E0510 00:50:58.159357 1925 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" May 10 00:50:58.159550 kubelet[1925]: E0510 00:50:58.159413 1925 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c"} May 10 00:50:58.159550 kubelet[1925]: E0510 00:50:58.159452 1925 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"95aa6a47-b095-4d76-97b3-94e677b65c1b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:58.159550 kubelet[1925]: E0510 00:50:58.159495 1925 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"95aa6a47-b095-4d76-97b3-94e677b65c1b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-54f5dc6b49-2fhw9" podUID="95aa6a47-b095-4d76-97b3-94e677b65c1b" May 10 00:50:58.201266 env[1194]: time="2025-05-10T00:50:58.201187320Z" level=error msg="StopPodSandbox for \"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\" failed" error="failed to destroy network for sandbox \"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:58.201853 kubelet[1925]: E0510 00:50:58.201700 1925 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" May 10 00:50:58.201853 kubelet[1925]: E0510 00:50:58.201750 1925 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e"} May 10 00:50:58.201853 kubelet[1925]: E0510 00:50:58.201787 1925 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4c30e8b1-96d4-49c5-bb53-9f29c6d5985e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:58.201853 kubelet[1925]: E0510 00:50:58.201810 1925 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4c30e8b1-96d4-49c5-bb53-9f29c6d5985e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-54f5dc6b49-sst45" podUID="4c30e8b1-96d4-49c5-bb53-9f29c6d5985e" May 10 00:51:03.172191 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3080100420.mount: Deactivated successfully. May 10 00:51:03.213979 env[1194]: time="2025-05-10T00:51:03.213907522Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:03.216330 env[1194]: time="2025-05-10T00:51:03.216265694Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:03.218767 env[1194]: time="2025-05-10T00:51:03.218708450Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:03.220511 env[1194]: time="2025-05-10T00:51:03.220452401Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:03.221410 env[1194]: time="2025-05-10T00:51:03.221351897Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 10 00:51:03.269301 env[1194]: time="2025-05-10T00:51:03.268713077Z" level=info msg="CreateContainer within sandbox \"92a2ed2e92fdb136b1f6a1c9260170f54d981aede5f8961c791ad933a3d77f27\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:51:03.297197 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount132736013.mount: Deactivated successfully. May 10 00:51:03.304981 env[1194]: time="2025-05-10T00:51:03.304886637Z" level=info msg="CreateContainer within sandbox \"92a2ed2e92fdb136b1f6a1c9260170f54d981aede5f8961c791ad933a3d77f27\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"a1ec68e4e2db8f9c2048ca8fa5e50c73ab57646ca577d2c4863c23d5264cd500\"" May 10 00:51:03.306676 env[1194]: time="2025-05-10T00:51:03.306314741Z" level=info msg="StartContainer for \"a1ec68e4e2db8f9c2048ca8fa5e50c73ab57646ca577d2c4863c23d5264cd500\"" May 10 00:51:03.332890 systemd[1]: Started cri-containerd-a1ec68e4e2db8f9c2048ca8fa5e50c73ab57646ca577d2c4863c23d5264cd500.scope. May 10 00:51:03.378000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.381897 kernel: kauditd_printk_skb: 34 callbacks suppressed May 10 00:51:03.382045 kernel: audit: type=1400 audit(1746838263.378:1011): avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.378000 audit[3048]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f0a52e032f8 items=0 ppid=2389 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:03.388948 kernel: audit: type=1300 audit(1746838263.378:1011): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f0a52e032f8 items=0 ppid=2389 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:03.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131656336386534653264623866396332303438636138666135653530 May 10 00:51:03.392602 kernel: audit: type=1327 audit(1746838263.378:1011): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131656336386534653264623866396332303438636138666135653530 May 10 00:51:03.398928 kernel: audit: type=1400 audit(1746838263.378:1012): avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.399088 kernel: audit: type=1400 audit(1746838263.378:1012): avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.378000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.378000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.402228 kernel: audit: type=1400 audit(1746838263.378:1012): avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.378000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.378000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.378000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.409672 kernel: audit: type=1400 audit(1746838263.378:1012): avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.409843 kernel: audit: type=1400 audit(1746838263.378:1012): avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.378000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.378000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.416464 kernel: audit: type=1400 audit(1746838263.378:1012): avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.416721 kernel: audit: type=1400 audit(1746838263.378:1012): avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.378000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.378000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.378000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.378000 audit: BPF prog-id=133 op=LOAD May 10 00:51:03.378000 audit[3048]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000024c48 items=0 ppid=2389 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:03.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131656336386534653264623866396332303438636138666135653530 May 10 00:51:03.379000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.379000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.379000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.379000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.379000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.379000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.379000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.379000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.379000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.379000 audit: BPF prog-id=134 op=LOAD May 10 00:51:03.379000 audit[3048]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000024c98 items=0 ppid=2389 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:03.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131656336386534653264623866396332303438636138666135653530 May 10 00:51:03.379000 audit: BPF prog-id=134 op=UNLOAD May 10 00:51:03.379000 audit: BPF prog-id=133 op=UNLOAD May 10 00:51:03.379000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.379000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.379000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.379000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.379000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.379000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.379000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.379000 audit[3048]: AVC avc: denied { perfmon } for pid=3048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.379000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.379000 audit[3048]: AVC avc: denied { bpf } for pid=3048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:03.379000 audit: BPF prog-id=135 op=LOAD May 10 00:51:03.379000 audit[3048]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000024d28 items=0 ppid=2389 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:03.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131656336386534653264623866396332303438636138666135653530 May 10 00:51:03.439401 env[1194]: time="2025-05-10T00:51:03.435263212Z" level=info msg="StartContainer for \"a1ec68e4e2db8f9c2048ca8fa5e50c73ab57646ca577d2c4863c23d5264cd500\" returns successfully" May 10 00:51:03.644166 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 10 00:51:03.644361 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 10 00:51:04.144246 kubelet[1925]: E0510 00:51:04.143955 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:51:04.218146 kubelet[1925]: I0510 00:51:04.218059 1925 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-plfvd" podStartSLOduration=1.725360778 podStartE2EDuration="20.211319579s" podCreationTimestamp="2025-05-10 00:50:44 +0000 UTC" firstStartedPulling="2025-05-10 00:50:44.737352634 +0000 UTC m=+12.993298660" lastFinishedPulling="2025-05-10 00:51:03.223311436 +0000 UTC m=+31.479257461" observedRunningTime="2025-05-10 00:51:04.205655523 +0000 UTC m=+32.461601571" watchObservedRunningTime="2025-05-10 00:51:04.211319579 +0000 UTC m=+32.467265623" May 10 00:51:05.143094 kubelet[1925]: E0510 00:51:05.143050 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:51:05.183856 systemd[1]: run-containerd-runc-k8s.io-a1ec68e4e2db8f9c2048ca8fa5e50c73ab57646ca577d2c4863c23d5264cd500-runc.cdVxTV.mount: Deactivated successfully. May 10 00:51:05.322000 audit[3198]: AVC avc: denied { write } for pid=3198 comm="tee" name="fd" dev="proc" ino=24593 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:05.322000 audit[3198]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffddf5cca06 a2=241 a3=1b6 items=1 ppid=3164 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.322000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:51:05.322000 audit: PATH item=0 name="/dev/fd/63" inode=24578 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:05.322000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:05.357000 audit[3225]: AVC avc: denied { write } for pid=3225 comm="tee" name="fd" dev="proc" ino=24435 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:05.357000 audit[3225]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffce35bda05 a2=241 a3=1b6 items=1 ppid=3173 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.357000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:51:05.357000 audit: PATH item=0 name="/dev/fd/63" inode=24431 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:05.357000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:05.367000 audit[3220]: AVC avc: denied { write } for pid=3220 comm="tee" name="fd" dev="proc" ino=24439 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:05.367000 audit[3220]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd6cb9ea05 a2=241 a3=1b6 items=1 ppid=3186 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.367000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:51:05.367000 audit: PATH item=0 name="/dev/fd/63" inode=24612 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:05.369000 audit[3218]: AVC avc: denied { write } for pid=3218 comm="tee" name="fd" dev="proc" ino=24443 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:05.369000 audit[3218]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1abac9f5 a2=241 a3=1b6 items=1 ppid=3165 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.371000 audit[3227]: AVC avc: denied { write } for pid=3227 comm="tee" name="fd" dev="proc" ino=24447 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:05.371000 audit[3227]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc833a5a05 a2=241 a3=1b6 items=1 ppid=3162 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.371000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:51:05.371000 audit: PATH item=0 name="/dev/fd/63" inode=24432 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:05.372000 audit[3216]: AVC avc: denied { write } for pid=3216 comm="tee" name="fd" dev="proc" ino=24451 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:05.372000 audit[3216]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc74b3a07 a2=241 a3=1b6 items=1 ppid=3178 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.372000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:51:05.372000 audit: PATH item=0 name="/dev/fd/63" inode=24426 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:05.372000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:05.378000 audit[3222]: AVC avc: denied { write } for pid=3222 comm="tee" name="fd" dev="proc" ino=24455 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:05.378000 audit[3222]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe249d59f6 a2=241 a3=1b6 items=1 ppid=3168 pid=3222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.378000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:51:05.378000 audit: PATH item=0 name="/dev/fd/63" inode=24615 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:05.369000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:51:05.369000 audit: PATH item=0 name="/dev/fd/63" inode=24611 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:05.369000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:05.367000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:05.371000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:05.378000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:05.693979 kubelet[1925]: I0510 00:51:05.693902 1925 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:51:05.694763 kubelet[1925]: E0510 00:51:05.694459 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:51:05.772000 audit[3245]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3245 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:05.772000 audit[3245]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe148c6230 a2=0 a3=7ffe148c621c items=0 ppid=2058 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.772000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:05.779000 audit[3245]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3245 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:05.779000 audit[3245]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe148c6230 a2=0 a3=7ffe148c621c items=0 ppid=2058 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.779000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:06.145668 kubelet[1925]: E0510 00:51:06.145597 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:51:06.146357 kubelet[1925]: E0510 00:51:06.146288 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:51:06.902000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.902000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.902000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.902000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.902000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.902000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.902000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.902000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.902000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.902000 audit: BPF prog-id=136 op=LOAD May 10 00:51:06.902000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffa9746c30 a2=98 a3=3 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:06.902000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:06.903000 audit: BPF prog-id=136 op=UNLOAD May 10 00:51:06.904000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.904000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.904000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.904000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.904000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.904000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.904000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.904000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.904000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.904000 audit: BPF prog-id=137 op=LOAD May 10 00:51:06.904000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa9746a10 a2=74 a3=540051 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:06.904000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:06.905000 audit: BPF prog-id=137 op=UNLOAD May 10 00:51:06.905000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.905000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.905000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.905000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.905000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.905000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.905000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.905000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.905000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:06.905000 audit: BPF prog-id=138 op=LOAD May 10 00:51:06.905000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa9746a40 a2=94 a3=2 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:06.905000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:06.905000 audit: BPF prog-id=138 op=UNLOAD May 10 00:51:07.049000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.049000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.049000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.049000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.049000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.049000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.049000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.049000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.049000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.049000 audit: BPF prog-id=139 op=LOAD May 10 00:51:07.049000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa9746900 a2=40 a3=1 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.049000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:07.051000 audit: BPF prog-id=139 op=UNLOAD May 10 00:51:07.051000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.051000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffa97469d0 a2=50 a3=7fffa9746ab0 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.051000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:07.063000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.063000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa9746910 a2=28 a3=0 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.063000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:07.064000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.064000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa9746940 a2=28 a3=0 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.064000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:07.064000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.064000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa9746850 a2=28 a3=0 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.064000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:07.064000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.064000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa9746960 a2=28 a3=0 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.064000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:07.064000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.064000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa9746940 a2=28 a3=0 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.064000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:07.064000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.064000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa9746930 a2=28 a3=0 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.064000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:07.064000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.064000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa9746960 a2=28 a3=0 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.064000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:07.064000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.064000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa9746940 a2=28 a3=0 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.064000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:07.064000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.064000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa9746960 a2=28 a3=0 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.064000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:07.064000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.064000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa9746930 a2=28 a3=0 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.064000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:07.065000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.065000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa97469a0 a2=28 a3=0 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.065000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:07.065000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.065000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffa9746750 a2=50 a3=1 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.065000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:07.066000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.066000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.066000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.066000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.066000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.066000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.066000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.066000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.066000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.066000 audit: BPF prog-id=140 op=LOAD May 10 00:51:07.066000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffa9746750 a2=94 a3=5 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.066000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:07.067000 audit: BPF prog-id=140 op=UNLOAD May 10 00:51:07.067000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.067000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffa9746800 a2=50 a3=1 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.067000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:07.067000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.067000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffa9746920 a2=4 a3=38 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.067000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:07.067000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.067000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.067000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.067000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.067000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.067000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.067000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.067000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.067000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.067000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.067000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:07.067000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffa9746970 a2=94 a3=6 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.067000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:07.069000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.069000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.069000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.069000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.069000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.069000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.069000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.069000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.069000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.069000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.069000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:07.069000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffa9746120 a2=94 a3=83 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.069000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:07.069000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.069000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.069000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.069000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.069000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.069000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.069000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.069000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.069000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.069000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.069000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:07.069000 audit[3323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffa9746120 a2=94 a3=83 items=0 ppid=3290 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.069000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:07.084000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.084000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.084000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.084000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.084000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.084000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.084000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.084000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.084000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.084000 audit: BPF prog-id=141 op=LOAD May 10 00:51:07.084000 audit[3326]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc4e87a080 a2=98 a3=1999999999999999 items=0 ppid=3290 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.084000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:51:07.085000 audit: BPF prog-id=141 op=UNLOAD May 10 00:51:07.085000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.085000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.085000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.085000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.085000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.085000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.085000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.085000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.085000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.085000 audit: BPF prog-id=142 op=LOAD May 10 00:51:07.085000 audit[3326]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc4e879f60 a2=74 a3=ffff items=0 ppid=3290 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.085000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:51:07.086000 audit: BPF prog-id=142 op=UNLOAD May 10 00:51:07.086000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.086000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.086000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.086000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.086000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.086000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.086000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.086000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.086000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.086000 audit: BPF prog-id=143 op=LOAD May 10 00:51:07.086000 audit[3326]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc4e879fa0 a2=40 a3=7ffc4e87a180 items=0 ppid=3290 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.086000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:51:07.086000 audit: BPF prog-id=143 op=UNLOAD May 10 00:51:07.166848 systemd-networkd[1006]: vxlan.calico: Link UP May 10 00:51:07.166859 systemd-networkd[1006]: vxlan.calico: Gained carrier May 10 00:51:07.217000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.217000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.217000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.217000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.217000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.217000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.217000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.217000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.217000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.217000 audit: BPF prog-id=144 op=LOAD May 10 00:51:07.217000 audit[3355]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb7d089d0 a2=98 a3=ffffffff items=0 ppid=3290 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.217000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:07.218000 audit: BPF prog-id=144 op=UNLOAD May 10 00:51:07.218000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.218000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.218000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.218000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.218000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.218000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.218000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.218000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.218000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.218000 audit: BPF prog-id=145 op=LOAD May 10 00:51:07.218000 audit[3355]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb7d087e0 a2=74 a3=540051 items=0 ppid=3290 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.218000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:07.218000 audit: BPF prog-id=145 op=UNLOAD May 10 00:51:07.218000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.218000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.218000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.218000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.218000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.218000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.218000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.218000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.218000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.218000 audit: BPF prog-id=146 op=LOAD May 10 00:51:07.218000 audit[3355]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb7d08810 a2=94 a3=2 items=0 ppid=3290 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.218000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:07.218000 audit: BPF prog-id=146 op=UNLOAD May 10 00:51:07.218000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.218000 audit[3355]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb7d086e0 a2=28 a3=0 items=0 ppid=3290 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.218000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:07.218000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.218000 audit[3355]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb7d08710 a2=28 a3=0 items=0 ppid=3290 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.218000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:07.218000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.218000 audit[3355]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb7d08620 a2=28 a3=0 items=0 ppid=3290 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.218000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb7d08730 a2=28 a3=0 items=0 ppid=3290 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.219000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb7d08710 a2=28 a3=0 items=0 ppid=3290 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.219000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb7d08700 a2=28 a3=0 items=0 ppid=3290 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.219000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb7d08730 a2=28 a3=0 items=0 ppid=3290 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.219000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb7d08710 a2=28 a3=0 items=0 ppid=3290 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.219000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb7d08730 a2=28 a3=0 items=0 ppid=3290 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.219000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb7d08700 a2=28 a3=0 items=0 ppid=3290 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.219000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb7d08770 a2=28 a3=0 items=0 ppid=3290 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.219000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit: BPF prog-id=147 op=LOAD May 10 00:51:07.219000 audit[3355]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffb7d085e0 a2=40 a3=0 items=0 ppid=3290 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.219000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:07.219000 audit: BPF prog-id=147 op=UNLOAD May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffb7d085d0 a2=50 a3=2800 items=0 ppid=3290 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.219000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffb7d085d0 a2=50 a3=2800 items=0 ppid=3290 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.219000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit: BPF prog-id=148 op=LOAD May 10 00:51:07.219000 audit[3355]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffb7d07df0 a2=94 a3=2 items=0 ppid=3290 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.219000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:07.219000 audit: BPF prog-id=148 op=UNLOAD May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.219000 audit: BPF prog-id=149 op=LOAD May 10 00:51:07.219000 audit[3355]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffb7d07ef0 a2=94 a3=30 items=0 ppid=3290 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.219000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit: BPF prog-id=150 op=LOAD May 10 00:51:07.223000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff4c0cb4d0 a2=98 a3=0 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.223000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.223000 audit: BPF prog-id=150 op=UNLOAD May 10 00:51:07.223000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit: BPF prog-id=151 op=LOAD May 10 00:51:07.223000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff4c0cb2b0 a2=74 a3=540051 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.223000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.223000 audit: BPF prog-id=151 op=UNLOAD May 10 00:51:07.223000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.223000 audit: BPF prog-id=152 op=LOAD May 10 00:51:07.223000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff4c0cb2e0 a2=94 a3=2 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.223000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.223000 audit: BPF prog-id=152 op=UNLOAD May 10 00:51:07.367000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.367000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.367000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.367000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.367000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.367000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.367000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.367000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.367000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.367000 audit: BPF prog-id=153 op=LOAD May 10 00:51:07.367000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff4c0cb1a0 a2=40 a3=1 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.367000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.367000 audit: BPF prog-id=153 op=UNLOAD May 10 00:51:07.367000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.367000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff4c0cb270 a2=50 a3=7fff4c0cb350 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.367000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff4c0cb1b0 a2=28 a3=0 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff4c0cb1e0 a2=28 a3=0 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff4c0cb0f0 a2=28 a3=0 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff4c0cb200 a2=28 a3=0 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff4c0cb1e0 a2=28 a3=0 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff4c0cb1d0 a2=28 a3=0 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff4c0cb200 a2=28 a3=0 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff4c0cb1e0 a2=28 a3=0 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff4c0cb200 a2=28 a3=0 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff4c0cb1d0 a2=28 a3=0 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff4c0cb240 a2=28 a3=0 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff4c0caff0 a2=50 a3=1 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit: BPF prog-id=154 op=LOAD May 10 00:51:07.379000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff4c0caff0 a2=94 a3=5 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.379000 audit: BPF prog-id=154 op=UNLOAD May 10 00:51:07.379000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff4c0cb0a0 a2=50 a3=1 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff4c0cb1c0 a2=4 a3=38 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.379000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:07.379000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff4c0cb210 a2=94 a3=6 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:07.380000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff4c0ca9c0 a2=94 a3=83 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { perfmon } for pid=3358 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:07.380000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff4c0ca9c0 a2=94 a3=83 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.380000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.380000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff4c0cc400 a2=10 a3=f1f00800 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.381000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.381000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff4c0cc2a0 a2=10 a3=3 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.381000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.381000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.381000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff4c0cc240 a2=10 a3=3 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.381000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.381000 audit[3358]: AVC avc: denied { bpf } for pid=3358 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:07.381000 audit[3358]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff4c0cc240 a2=10 a3=7 items=0 ppid=3290 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.381000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:07.389000 audit: BPF prog-id=149 op=UNLOAD May 10 00:51:07.483000 audit[3386]: NETFILTER_CFG table=raw:97 family=2 entries=21 op=nft_register_chain pid=3386 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:07.483000 audit[3386]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffef3a26920 a2=0 a3=7ffef3a2690c items=0 ppid=3290 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.483000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:07.487000 audit[3390]: NETFILTER_CFG table=mangle:98 family=2 entries=16 op=nft_register_chain pid=3390 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:07.487000 audit[3390]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffecd461de0 a2=0 a3=7ffecd461dcc items=0 ppid=3290 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.487000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:07.498000 audit[3387]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=3387 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:07.498000 audit[3387]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffdb0d42d70 a2=0 a3=7ffdb0d42d5c items=0 ppid=3290 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.498000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:07.499000 audit[3392]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3392 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:07.499000 audit[3392]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd07cdc4e0 a2=0 a3=7ffd07cdc4cc items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:07.499000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:08.302768 systemd-networkd[1006]: vxlan.calico: Gained IPv6LL May 10 00:51:08.920392 env[1194]: time="2025-05-10T00:51:08.920311523Z" level=info msg="StopPodSandbox for \"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\"" May 10 00:51:09.171083 env[1194]: 2025-05-10 00:51:09.005 [INFO][3418] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" May 10 00:51:09.171083 env[1194]: 2025-05-10 00:51:09.006 [INFO][3418] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" iface="eth0" netns="/var/run/netns/cni-deca9946-3285-fb16-b934-16185b3e016d" May 10 00:51:09.171083 env[1194]: 2025-05-10 00:51:09.006 [INFO][3418] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" iface="eth0" netns="/var/run/netns/cni-deca9946-3285-fb16-b934-16185b3e016d" May 10 00:51:09.171083 env[1194]: 2025-05-10 00:51:09.008 [INFO][3418] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" iface="eth0" netns="/var/run/netns/cni-deca9946-3285-fb16-b934-16185b3e016d" May 10 00:51:09.171083 env[1194]: 2025-05-10 00:51:09.008 [INFO][3418] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" May 10 00:51:09.171083 env[1194]: 2025-05-10 00:51:09.008 [INFO][3418] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" May 10 00:51:09.171083 env[1194]: 2025-05-10 00:51:09.143 [INFO][3425] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" HandleID="k8s-pod-network.0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0" May 10 00:51:09.171083 env[1194]: 2025-05-10 00:51:09.145 [INFO][3425] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:09.171083 env[1194]: 2025-05-10 00:51:09.146 [INFO][3425] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:09.171083 env[1194]: 2025-05-10 00:51:09.161 [WARNING][3425] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" HandleID="k8s-pod-network.0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0" May 10 00:51:09.171083 env[1194]: 2025-05-10 00:51:09.161 [INFO][3425] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" HandleID="k8s-pod-network.0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0" May 10 00:51:09.171083 env[1194]: 2025-05-10 00:51:09.165 [INFO][3425] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:09.171083 env[1194]: 2025-05-10 00:51:09.167 [INFO][3418] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" May 10 00:51:09.176216 env[1194]: time="2025-05-10T00:51:09.171933863Z" level=info msg="TearDown network for sandbox \"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\" successfully" May 10 00:51:09.176216 env[1194]: time="2025-05-10T00:51:09.172026569Z" level=info msg="StopPodSandbox for \"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\" returns successfully" May 10 00:51:09.174559 systemd[1]: run-netns-cni\x2ddeca9946\x2d3285\x2dfb16\x2db934\x2d16185b3e016d.mount: Deactivated successfully. May 10 00:51:09.178785 kubelet[1925]: E0510 00:51:09.178231 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:51:09.180780 env[1194]: time="2025-05-10T00:51:09.180740374Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-vlx8n,Uid:1ea33208-eaf4-4a7e-b4f4-0abb3d6d89dd,Namespace:kube-system,Attempt:1,}" May 10 00:51:09.473274 systemd-networkd[1006]: cali87d6849d4ba: Link UP May 10 00:51:09.476651 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:51:09.476790 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali87d6849d4ba: link becomes ready May 10 00:51:09.476949 systemd-networkd[1006]: cali87d6849d4ba: Gained carrier May 10 00:51:09.506857 env[1194]: 2025-05-10 00:51:09.256 [INFO][3432] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0 coredns-668d6bf9bc- kube-system 1ea33208-eaf4-4a7e-b4f4-0abb3d6d89dd 810 0 2025-05-10 00:50:37 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-09020fac35 coredns-668d6bf9bc-vlx8n eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali87d6849d4ba [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17" Namespace="kube-system" Pod="coredns-668d6bf9bc-vlx8n" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-" May 10 00:51:09.506857 env[1194]: 2025-05-10 00:51:09.256 [INFO][3432] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17" Namespace="kube-system" Pod="coredns-668d6bf9bc-vlx8n" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0" May 10 00:51:09.506857 env[1194]: 2025-05-10 00:51:09.315 [INFO][3444] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17" HandleID="k8s-pod-network.89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0" May 10 00:51:09.506857 env[1194]: 2025-05-10 00:51:09.329 [INFO][3444] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17" HandleID="k8s-pod-network.89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031b3d0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-09020fac35", "pod":"coredns-668d6bf9bc-vlx8n", "timestamp":"2025-05-10 00:51:09.315090789 +0000 UTC"}, Hostname:"ci-3510.3.7-n-09020fac35", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:51:09.506857 env[1194]: 2025-05-10 00:51:09.329 [INFO][3444] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:09.506857 env[1194]: 2025-05-10 00:51:09.329 [INFO][3444] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:09.506857 env[1194]: 2025-05-10 00:51:09.329 [INFO][3444] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-09020fac35' May 10 00:51:09.506857 env[1194]: 2025-05-10 00:51:09.335 [INFO][3444] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17" host="ci-3510.3.7-n-09020fac35" May 10 00:51:09.506857 env[1194]: 2025-05-10 00:51:09.426 [INFO][3444] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-09020fac35" May 10 00:51:09.506857 env[1194]: 2025-05-10 00:51:09.434 [INFO][3444] ipam/ipam.go 489: Trying affinity for 192.168.64.64/26 host="ci-3510.3.7-n-09020fac35" May 10 00:51:09.506857 env[1194]: 2025-05-10 00:51:09.438 [INFO][3444] ipam/ipam.go 155: Attempting to load block cidr=192.168.64.64/26 host="ci-3510.3.7-n-09020fac35" May 10 00:51:09.506857 env[1194]: 2025-05-10 00:51:09.442 [INFO][3444] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.64/26 host="ci-3510.3.7-n-09020fac35" May 10 00:51:09.506857 env[1194]: 2025-05-10 00:51:09.442 [INFO][3444] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.64/26 handle="k8s-pod-network.89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17" host="ci-3510.3.7-n-09020fac35" May 10 00:51:09.506857 env[1194]: 2025-05-10 00:51:09.446 [INFO][3444] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17 May 10 00:51:09.506857 env[1194]: 2025-05-10 00:51:09.454 [INFO][3444] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.64.64/26 handle="k8s-pod-network.89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17" host="ci-3510.3.7-n-09020fac35" May 10 00:51:09.506857 env[1194]: 2025-05-10 00:51:09.462 [INFO][3444] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.64.65/26] block=192.168.64.64/26 handle="k8s-pod-network.89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17" host="ci-3510.3.7-n-09020fac35" May 10 00:51:09.506857 env[1194]: 2025-05-10 00:51:09.462 [INFO][3444] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.65/26] handle="k8s-pod-network.89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17" host="ci-3510.3.7-n-09020fac35" May 10 00:51:09.506857 env[1194]: 2025-05-10 00:51:09.462 [INFO][3444] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:09.506857 env[1194]: 2025-05-10 00:51:09.462 [INFO][3444] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.64.65/26] IPv6=[] ContainerID="89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17" HandleID="k8s-pod-network.89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0" May 10 00:51:09.507753 env[1194]: 2025-05-10 00:51:09.466 [INFO][3432] cni-plugin/k8s.go 386: Populated endpoint ContainerID="89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17" Namespace="kube-system" Pod="coredns-668d6bf9bc-vlx8n" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"1ea33208-eaf4-4a7e-b4f4-0abb3d6d89dd", ResourceVersion:"810", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"", Pod:"coredns-668d6bf9bc-vlx8n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali87d6849d4ba", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:09.507753 env[1194]: 2025-05-10 00:51:09.466 [INFO][3432] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.64.65/32] ContainerID="89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17" Namespace="kube-system" Pod="coredns-668d6bf9bc-vlx8n" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0" May 10 00:51:09.507753 env[1194]: 2025-05-10 00:51:09.467 [INFO][3432] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali87d6849d4ba ContainerID="89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17" Namespace="kube-system" Pod="coredns-668d6bf9bc-vlx8n" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0" May 10 00:51:09.507753 env[1194]: 2025-05-10 00:51:09.479 [INFO][3432] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17" Namespace="kube-system" Pod="coredns-668d6bf9bc-vlx8n" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0" May 10 00:51:09.507753 env[1194]: 2025-05-10 00:51:09.480 [INFO][3432] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17" Namespace="kube-system" Pod="coredns-668d6bf9bc-vlx8n" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"1ea33208-eaf4-4a7e-b4f4-0abb3d6d89dd", ResourceVersion:"810", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17", Pod:"coredns-668d6bf9bc-vlx8n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali87d6849d4ba", MAC:"12:15:30:4b:84:22", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:09.507753 env[1194]: 2025-05-10 00:51:09.504 [INFO][3432] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17" Namespace="kube-system" Pod="coredns-668d6bf9bc-vlx8n" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0" May 10 00:51:09.527273 env[1194]: time="2025-05-10T00:51:09.527160267Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:51:09.527273 env[1194]: time="2025-05-10T00:51:09.527219843Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:51:09.527273 env[1194]: time="2025-05-10T00:51:09.527231445Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:51:09.527823 env[1194]: time="2025-05-10T00:51:09.527777486Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17 pid=3471 runtime=io.containerd.runc.v2 May 10 00:51:09.538000 audit[3482]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3482 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:09.541388 kernel: kauditd_printk_skb: 554 callbacks suppressed May 10 00:51:09.541477 kernel: audit: type=1325 audit(1746838269.538:1121): table=filter:101 family=2 entries=34 op=nft_register_chain pid=3482 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:09.538000 audit[3482]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffcc4b9f710 a2=0 a3=7ffcc4b9f6fc items=0 ppid=3290 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:09.547026 kernel: audit: type=1300 audit(1746838269.538:1121): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffcc4b9f710 a2=0 a3=7ffcc4b9f6fc items=0 ppid=3290 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:09.538000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:09.549295 kernel: audit: type=1327 audit(1746838269.538:1121): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:09.559800 systemd[1]: Started cri-containerd-89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17.scope. May 10 00:51:09.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.586258 kernel: audit: type=1400 audit(1746838269.580:1122): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.586353 kernel: audit: type=1400 audit(1746838269.580:1123): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.586397 kernel: audit: type=1400 audit(1746838269.580:1124): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.588681 kernel: audit: type=1400 audit(1746838269.580:1125): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.599302 kernel: audit: type=1400 audit(1746838269.580:1126): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.599452 kernel: audit: type=1400 audit(1746838269.580:1127): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.587000 audit: BPF prog-id=155 op=LOAD May 10 00:51:09.590000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.606734 kernel: audit: type=1400 audit(1746838269.580:1128): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3471 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:09.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839643562356365363862653438346665333662333035356636366462 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3471 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:09.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839643562356365363862653438346665333662333035356636366462 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit: BPF prog-id=156 op=LOAD May 10 00:51:09.590000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00020bf80 items=0 ppid=3471 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:09.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839643562356365363862653438346665333662333035356636366462 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit: BPF prog-id=157 op=LOAD May 10 00:51:09.590000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00020bfc8 items=0 ppid=3471 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:09.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839643562356365363862653438346665333662333035356636366462 May 10 00:51:09.590000 audit: BPF prog-id=157 op=UNLOAD May 10 00:51:09.590000 audit: BPF prog-id=156 op=UNLOAD May 10 00:51:09.590000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.590000 audit: BPF prog-id=158 op=LOAD May 10 00:51:09.590000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003843d8 items=0 ppid=3471 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:09.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839643562356365363862653438346665333662333035356636366462 May 10 00:51:09.633533 env[1194]: time="2025-05-10T00:51:09.633489632Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-vlx8n,Uid:1ea33208-eaf4-4a7e-b4f4-0abb3d6d89dd,Namespace:kube-system,Attempt:1,} returns sandbox id \"89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17\"" May 10 00:51:09.635494 kubelet[1925]: E0510 00:51:09.634789 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:51:09.637796 env[1194]: time="2025-05-10T00:51:09.637745705Z" level=info msg="CreateContainer within sandbox \"89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:51:09.654115 env[1194]: time="2025-05-10T00:51:09.654055415Z" level=info msg="CreateContainer within sandbox \"89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e00d683fc4c54a02e79602b096413f57fd65ec59b73c64ddb3c3d72e6c92f31d\"" May 10 00:51:09.655300 env[1194]: time="2025-05-10T00:51:09.655264596Z" level=info msg="StartContainer for \"e00d683fc4c54a02e79602b096413f57fd65ec59b73c64ddb3c3d72e6c92f31d\"" May 10 00:51:09.674246 systemd[1]: Started cri-containerd-e00d683fc4c54a02e79602b096413f57fd65ec59b73c64ddb3c3d72e6c92f31d.scope. May 10 00:51:09.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.693000 audit: BPF prog-id=159 op=LOAD May 10 00:51:09.694000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.694000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3471 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:09.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530306436383366633463353461303265373936303262303936343133 May 10 00:51:09.694000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.694000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3471 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:09.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530306436383366633463353461303265373936303262303936343133 May 10 00:51:09.694000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.694000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.694000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.694000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.694000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.694000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.694000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.694000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.694000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.694000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.694000 audit: BPF prog-id=160 op=LOAD May 10 00:51:09.694000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001e1fb0 items=0 ppid=3471 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:09.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530306436383366633463353461303265373936303262303936343133 May 10 00:51:09.694000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.694000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.694000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.694000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.694000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.694000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.694000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.694000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.694000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.694000 audit: BPF prog-id=161 op=LOAD May 10 00:51:09.694000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001e1ff8 items=0 ppid=3471 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:09.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530306436383366633463353461303265373936303262303936343133 May 10 00:51:09.695000 audit: BPF prog-id=161 op=UNLOAD May 10 00:51:09.695000 audit: BPF prog-id=160 op=UNLOAD May 10 00:51:09.695000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.695000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.695000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.695000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.695000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.695000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.695000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.695000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.695000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.695000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:09.695000 audit: BPF prog-id=162 op=LOAD May 10 00:51:09.695000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000318408 items=0 ppid=3471 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:09.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530306436383366633463353461303265373936303262303936343133 May 10 00:51:09.722693 env[1194]: time="2025-05-10T00:51:09.722634573Z" level=info msg="StartContainer for \"e00d683fc4c54a02e79602b096413f57fd65ec59b73c64ddb3c3d72e6c92f31d\" returns successfully" May 10 00:51:09.831000 audit[3525]: AVC avc: denied { getattr } for pid=3525 comm="coredns" path="cgroup:[4026532672]" dev="nsfs" ino=4026532672 scontext=system_u:system_r:svirt_lxc_net_t:s0:c222,c553 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 10 00:51:09.831000 audit[3525]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aa08 a2=c000134c68 a3=0 items=0 ppid=3471 pid=3525 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c222,c553 key=(null) May 10 00:51:09.831000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 10 00:51:09.921422 env[1194]: time="2025-05-10T00:51:09.921347186Z" level=info msg="StopPodSandbox for \"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\"" May 10 00:51:10.084394 env[1194]: 2025-05-10 00:51:10.011 [INFO][3559] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" May 10 00:51:10.084394 env[1194]: 2025-05-10 00:51:10.012 [INFO][3559] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" iface="eth0" netns="/var/run/netns/cni-ed900abc-cb80-9b62-1c54-78fde7b6a2b9" May 10 00:51:10.084394 env[1194]: 2025-05-10 00:51:10.012 [INFO][3559] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" iface="eth0" netns="/var/run/netns/cni-ed900abc-cb80-9b62-1c54-78fde7b6a2b9" May 10 00:51:10.084394 env[1194]: 2025-05-10 00:51:10.013 [INFO][3559] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" iface="eth0" netns="/var/run/netns/cni-ed900abc-cb80-9b62-1c54-78fde7b6a2b9" May 10 00:51:10.084394 env[1194]: 2025-05-10 00:51:10.013 [INFO][3559] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" May 10 00:51:10.084394 env[1194]: 2025-05-10 00:51:10.013 [INFO][3559] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" May 10 00:51:10.084394 env[1194]: 2025-05-10 00:51:10.060 [INFO][3566] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" HandleID="k8s-pod-network.4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0" May 10 00:51:10.084394 env[1194]: 2025-05-10 00:51:10.060 [INFO][3566] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:10.084394 env[1194]: 2025-05-10 00:51:10.060 [INFO][3566] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:10.084394 env[1194]: 2025-05-10 00:51:10.074 [WARNING][3566] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" HandleID="k8s-pod-network.4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0" May 10 00:51:10.084394 env[1194]: 2025-05-10 00:51:10.075 [INFO][3566] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" HandleID="k8s-pod-network.4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0" May 10 00:51:10.084394 env[1194]: 2025-05-10 00:51:10.078 [INFO][3566] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:10.084394 env[1194]: 2025-05-10 00:51:10.081 [INFO][3559] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" May 10 00:51:10.084394 env[1194]: time="2025-05-10T00:51:10.083916507Z" level=info msg="TearDown network for sandbox \"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\" successfully" May 10 00:51:10.084394 env[1194]: time="2025-05-10T00:51:10.084059135Z" level=info msg="StopPodSandbox for \"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\" returns successfully" May 10 00:51:10.085142 kubelet[1925]: E0510 00:51:10.084541 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:51:10.087237 env[1194]: time="2025-05-10T00:51:10.085981119Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-8729n,Uid:309470cc-1a19-4c2f-ac9a-68ac7d4eb559,Namespace:kube-system,Attempt:1,}" May 10 00:51:10.165268 kubelet[1925]: E0510 00:51:10.165186 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:51:10.180207 systemd[1]: run-containerd-runc-k8s.io-89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17-runc.KaHFYu.mount: Deactivated successfully. May 10 00:51:10.180373 systemd[1]: run-netns-cni\x2ded900abc\x2dcb80\x2d9b62\x2d1c54\x2d78fde7b6a2b9.mount: Deactivated successfully. May 10 00:51:10.213581 kubelet[1925]: I0510 00:51:10.213481 1925 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-vlx8n" podStartSLOduration=33.213459724 podStartE2EDuration="33.213459724s" podCreationTimestamp="2025-05-10 00:50:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:51:10.19290785 +0000 UTC m=+38.448853890" watchObservedRunningTime="2025-05-10 00:51:10.213459724 +0000 UTC m=+38.469405780" May 10 00:51:10.263000 audit[3595]: NETFILTER_CFG table=filter:102 family=2 entries=16 op=nft_register_rule pid=3595 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:10.263000 audit[3595]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffeb6067490 a2=0 a3=7ffeb606747c items=0 ppid=2058 pid=3595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:10.263000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:10.267000 audit[3595]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=3595 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:10.267000 audit[3595]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffeb6067490 a2=0 a3=0 items=0 ppid=2058 pid=3595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:10.267000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:10.296000 audit[3598]: NETFILTER_CFG table=filter:104 family=2 entries=13 op=nft_register_rule pid=3598 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:10.296000 audit[3598]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffdc6d8e290 a2=0 a3=7ffdc6d8e27c items=0 ppid=2058 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:10.296000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:10.301000 audit[3598]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=3598 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:10.301000 audit[3598]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffdc6d8e290 a2=0 a3=7ffdc6d8e27c items=0 ppid=2058 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:10.301000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:10.333808 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9e5c3f14f8b: link becomes ready May 10 00:51:10.333429 systemd-networkd[1006]: cali9e5c3f14f8b: Link UP May 10 00:51:10.334258 systemd-networkd[1006]: cali9e5c3f14f8b: Gained carrier May 10 00:51:10.364881 env[1194]: 2025-05-10 00:51:10.167 [INFO][3573] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0 coredns-668d6bf9bc- kube-system 309470cc-1a19-4c2f-ac9a-68ac7d4eb559 823 0 2025-05-10 00:50:37 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-09020fac35 coredns-668d6bf9bc-8729n eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali9e5c3f14f8b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d" Namespace="kube-system" Pod="coredns-668d6bf9bc-8729n" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-" May 10 00:51:10.364881 env[1194]: 2025-05-10 00:51:10.168 [INFO][3573] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d" Namespace="kube-system" Pod="coredns-668d6bf9bc-8729n" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0" May 10 00:51:10.364881 env[1194]: 2025-05-10 00:51:10.247 [INFO][3588] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d" HandleID="k8s-pod-network.f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0" May 10 00:51:10.364881 env[1194]: 2025-05-10 00:51:10.267 [INFO][3588] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d" HandleID="k8s-pod-network.f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000314b30), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-09020fac35", "pod":"coredns-668d6bf9bc-8729n", "timestamp":"2025-05-10 00:51:10.247513909 +0000 UTC"}, Hostname:"ci-3510.3.7-n-09020fac35", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:51:10.364881 env[1194]: 2025-05-10 00:51:10.267 [INFO][3588] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:10.364881 env[1194]: 2025-05-10 00:51:10.267 [INFO][3588] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:10.364881 env[1194]: 2025-05-10 00:51:10.268 [INFO][3588] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-09020fac35' May 10 00:51:10.364881 env[1194]: 2025-05-10 00:51:10.273 [INFO][3588] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d" host="ci-3510.3.7-n-09020fac35" May 10 00:51:10.364881 env[1194]: 2025-05-10 00:51:10.284 [INFO][3588] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-09020fac35" May 10 00:51:10.364881 env[1194]: 2025-05-10 00:51:10.293 [INFO][3588] ipam/ipam.go 489: Trying affinity for 192.168.64.64/26 host="ci-3510.3.7-n-09020fac35" May 10 00:51:10.364881 env[1194]: 2025-05-10 00:51:10.297 [INFO][3588] ipam/ipam.go 155: Attempting to load block cidr=192.168.64.64/26 host="ci-3510.3.7-n-09020fac35" May 10 00:51:10.364881 env[1194]: 2025-05-10 00:51:10.300 [INFO][3588] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.64/26 host="ci-3510.3.7-n-09020fac35" May 10 00:51:10.364881 env[1194]: 2025-05-10 00:51:10.300 [INFO][3588] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.64/26 handle="k8s-pod-network.f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d" host="ci-3510.3.7-n-09020fac35" May 10 00:51:10.364881 env[1194]: 2025-05-10 00:51:10.304 [INFO][3588] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d May 10 00:51:10.364881 env[1194]: 2025-05-10 00:51:10.310 [INFO][3588] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.64.64/26 handle="k8s-pod-network.f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d" host="ci-3510.3.7-n-09020fac35" May 10 00:51:10.364881 env[1194]: 2025-05-10 00:51:10.319 [INFO][3588] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.64.66/26] block=192.168.64.64/26 handle="k8s-pod-network.f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d" host="ci-3510.3.7-n-09020fac35" May 10 00:51:10.364881 env[1194]: 2025-05-10 00:51:10.319 [INFO][3588] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.66/26] handle="k8s-pod-network.f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d" host="ci-3510.3.7-n-09020fac35" May 10 00:51:10.364881 env[1194]: 2025-05-10 00:51:10.319 [INFO][3588] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:10.364881 env[1194]: 2025-05-10 00:51:10.319 [INFO][3588] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.64.66/26] IPv6=[] ContainerID="f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d" HandleID="k8s-pod-network.f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0" May 10 00:51:10.365926 env[1194]: 2025-05-10 00:51:10.322 [INFO][3573] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d" Namespace="kube-system" Pod="coredns-668d6bf9bc-8729n" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"309470cc-1a19-4c2f-ac9a-68ac7d4eb559", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"", Pod:"coredns-668d6bf9bc-8729n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9e5c3f14f8b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:10.365926 env[1194]: 2025-05-10 00:51:10.322 [INFO][3573] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.64.66/32] ContainerID="f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d" Namespace="kube-system" Pod="coredns-668d6bf9bc-8729n" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0" May 10 00:51:10.365926 env[1194]: 2025-05-10 00:51:10.322 [INFO][3573] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9e5c3f14f8b ContainerID="f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d" Namespace="kube-system" Pod="coredns-668d6bf9bc-8729n" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0" May 10 00:51:10.365926 env[1194]: 2025-05-10 00:51:10.334 [INFO][3573] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d" Namespace="kube-system" Pod="coredns-668d6bf9bc-8729n" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0" May 10 00:51:10.365926 env[1194]: 2025-05-10 00:51:10.342 [INFO][3573] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d" Namespace="kube-system" Pod="coredns-668d6bf9bc-8729n" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"309470cc-1a19-4c2f-ac9a-68ac7d4eb559", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d", Pod:"coredns-668d6bf9bc-8729n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9e5c3f14f8b", MAC:"82:8e:f9:11:fc:7c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:10.365926 env[1194]: 2025-05-10 00:51:10.361 [INFO][3573] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d" Namespace="kube-system" Pod="coredns-668d6bf9bc-8729n" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0" May 10 00:51:10.395000 audit[3615]: NETFILTER_CFG table=filter:106 family=2 entries=30 op=nft_register_chain pid=3615 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:10.395000 audit[3615]: SYSCALL arch=c000003e syscall=46 success=yes exit=17032 a0=3 a1=7ffee638bad0 a2=0 a3=7ffee638babc items=0 ppid=3290 pid=3615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:10.395000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:10.398939 env[1194]: time="2025-05-10T00:51:10.398809421Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:51:10.398939 env[1194]: time="2025-05-10T00:51:10.398886045Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:51:10.399365 env[1194]: time="2025-05-10T00:51:10.398905976Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:51:10.400069 env[1194]: time="2025-05-10T00:51:10.399839318Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d pid=3619 runtime=io.containerd.runc.v2 May 10 00:51:10.433398 systemd[1]: Started cri-containerd-f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d.scope. May 10 00:51:10.440751 systemd[1]: run-containerd-runc-k8s.io-f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d-runc.EMbYm4.mount: Deactivated successfully. May 10 00:51:10.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.469000 audit: BPF prog-id=163 op=LOAD May 10 00:51:10.470000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.470000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3619 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:10.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638313330646662623134353836356661376163323062356136333131 May 10 00:51:10.470000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.470000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3619 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:10.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638313330646662623134353836356661376163323062356136333131 May 10 00:51:10.470000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.470000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.470000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.470000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.470000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.470000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.470000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.470000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.470000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.470000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.470000 audit: BPF prog-id=164 op=LOAD May 10 00:51:10.470000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00038ebf0 items=0 ppid=3619 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:10.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638313330646662623134353836356661376163323062356136333131 May 10 00:51:10.470000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.470000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.470000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.470000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.470000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.470000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.470000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.470000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.470000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.470000 audit: BPF prog-id=165 op=LOAD May 10 00:51:10.470000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00038ec38 items=0 ppid=3619 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:10.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638313330646662623134353836356661376163323062356136333131 May 10 00:51:10.471000 audit: BPF prog-id=165 op=UNLOAD May 10 00:51:10.471000 audit: BPF prog-id=164 op=UNLOAD May 10 00:51:10.471000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.471000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.471000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.471000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.471000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.471000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.471000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.471000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.471000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.471000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.471000 audit: BPF prog-id=166 op=LOAD May 10 00:51:10.471000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00038f048 items=0 ppid=3619 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:10.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638313330646662623134353836356661376163323062356136333131 May 10 00:51:10.514205 env[1194]: time="2025-05-10T00:51:10.514135054Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-8729n,Uid:309470cc-1a19-4c2f-ac9a-68ac7d4eb559,Namespace:kube-system,Attempt:1,} returns sandbox id \"f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d\"" May 10 00:51:10.515685 kubelet[1925]: E0510 00:51:10.515489 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:51:10.521863 env[1194]: time="2025-05-10T00:51:10.521796468Z" level=info msg="CreateContainer within sandbox \"f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:51:10.546185 env[1194]: time="2025-05-10T00:51:10.546082398Z" level=info msg="CreateContainer within sandbox \"f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"525218206c03185b9981cf0ca516c343edd6f36d2b653ed03b6b18dbdd188aee\"" May 10 00:51:10.548283 env[1194]: time="2025-05-10T00:51:10.548222272Z" level=info msg="StartContainer for \"525218206c03185b9981cf0ca516c343edd6f36d2b653ed03b6b18dbdd188aee\"" May 10 00:51:10.579637 systemd[1]: Started cri-containerd-525218206c03185b9981cf0ca516c343edd6f36d2b653ed03b6b18dbdd188aee.scope. May 10 00:51:10.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.604000 audit: BPF prog-id=167 op=LOAD May 10 00:51:10.606000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.606000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3619 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:10.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532353231383230366330333138356239393831636630636135313663 May 10 00:51:10.607000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.607000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3619 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:10.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532353231383230366330333138356239393831636630636135313663 May 10 00:51:10.607000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.607000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.607000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.607000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.607000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.607000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.607000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.607000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.607000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.607000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.607000 audit: BPF prog-id=168 op=LOAD May 10 00:51:10.607000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000d9d40 items=0 ppid=3619 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:10.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532353231383230366330333138356239393831636630636135313663 May 10 00:51:10.609000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.609000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.609000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.609000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.609000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.609000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.609000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.609000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.609000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.609000 audit: BPF prog-id=169 op=LOAD May 10 00:51:10.609000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000d9d88 items=0 ppid=3619 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:10.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532353231383230366330333138356239393831636630636135313663 May 10 00:51:10.610000 audit: BPF prog-id=169 op=UNLOAD May 10 00:51:10.610000 audit: BPF prog-id=168 op=UNLOAD May 10 00:51:10.610000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.610000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.610000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.610000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.610000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.610000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.610000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.610000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.610000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.610000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:10.610000 audit: BPF prog-id=170 op=LOAD May 10 00:51:10.610000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000324198 items=0 ppid=3619 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:10.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532353231383230366330333138356239393831636630636135313663 May 10 00:51:10.635690 env[1194]: time="2025-05-10T00:51:10.635571571Z" level=info msg="StartContainer for \"525218206c03185b9981cf0ca516c343edd6f36d2b653ed03b6b18dbdd188aee\" returns successfully" May 10 00:51:10.665000 audit[3673]: AVC avc: denied { getattr } for pid=3673 comm="coredns" path="cgroup:[4026532345]" dev="nsfs" ino=4026532345 scontext=system_u:system_r:svirt_lxc_net_t:s0:c643,c975 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 10 00:51:10.665000 audit[3673]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a9a8 a2=c00043eac8 a3=0 items=0 ppid=3619 pid=3673 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c643,c975 key=(null) May 10 00:51:10.665000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 10 00:51:10.734004 systemd-networkd[1006]: cali87d6849d4ba: Gained IPv6LL May 10 00:51:10.923655 env[1194]: time="2025-05-10T00:51:10.923118769Z" level=info msg="StopPodSandbox for \"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\"" May 10 00:51:11.051079 env[1194]: 2025-05-10 00:51:10.993 [INFO][3707] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" May 10 00:51:11.051079 env[1194]: 2025-05-10 00:51:10.993 [INFO][3707] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" iface="eth0" netns="/var/run/netns/cni-76002806-482c-613a-bdc9-08f786a4e403" May 10 00:51:11.051079 env[1194]: 2025-05-10 00:51:10.994 [INFO][3707] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" iface="eth0" netns="/var/run/netns/cni-76002806-482c-613a-bdc9-08f786a4e403" May 10 00:51:11.051079 env[1194]: 2025-05-10 00:51:10.994 [INFO][3707] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" iface="eth0" netns="/var/run/netns/cni-76002806-482c-613a-bdc9-08f786a4e403" May 10 00:51:11.051079 env[1194]: 2025-05-10 00:51:10.994 [INFO][3707] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" May 10 00:51:11.051079 env[1194]: 2025-05-10 00:51:10.994 [INFO][3707] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" May 10 00:51:11.051079 env[1194]: 2025-05-10 00:51:11.029 [INFO][3714] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" HandleID="k8s-pod-network.8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0" May 10 00:51:11.051079 env[1194]: 2025-05-10 00:51:11.033 [INFO][3714] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:11.051079 env[1194]: 2025-05-10 00:51:11.033 [INFO][3714] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:11.051079 env[1194]: 2025-05-10 00:51:11.043 [WARNING][3714] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" HandleID="k8s-pod-network.8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0" May 10 00:51:11.051079 env[1194]: 2025-05-10 00:51:11.043 [INFO][3714] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" HandleID="k8s-pod-network.8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0" May 10 00:51:11.051079 env[1194]: 2025-05-10 00:51:11.046 [INFO][3714] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:11.051079 env[1194]: 2025-05-10 00:51:11.048 [INFO][3707] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" May 10 00:51:11.051806 env[1194]: time="2025-05-10T00:51:11.051289457Z" level=info msg="TearDown network for sandbox \"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\" successfully" May 10 00:51:11.051806 env[1194]: time="2025-05-10T00:51:11.051326994Z" level=info msg="StopPodSandbox for \"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\" returns successfully" May 10 00:51:11.052927 env[1194]: time="2025-05-10T00:51:11.052865004Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54f5dc6b49-sst45,Uid:4c30e8b1-96d4-49c5-bb53-9f29c6d5985e,Namespace:calico-apiserver,Attempt:1,}" May 10 00:51:11.177214 kubelet[1925]: E0510 00:51:11.170993 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:51:11.177214 kubelet[1925]: E0510 00:51:11.170994 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:51:11.192982 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3211829858.mount: Deactivated successfully. May 10 00:51:11.193136 systemd[1]: run-netns-cni\x2d76002806\x2d482c\x2d613a\x2dbdc9\x2d08f786a4e403.mount: Deactivated successfully. May 10 00:51:11.307063 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8b13b1da469: link becomes ready May 10 00:51:11.306469 systemd-networkd[1006]: cali8b13b1da469: Link UP May 10 00:51:11.306676 systemd-networkd[1006]: cali8b13b1da469: Gained carrier May 10 00:51:11.329296 kubelet[1925]: I0510 00:51:11.328722 1925 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-8729n" podStartSLOduration=34.328690809 podStartE2EDuration="34.328690809s" podCreationTimestamp="2025-05-10 00:50:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:51:11.195523435 +0000 UTC m=+39.451469504" watchObservedRunningTime="2025-05-10 00:51:11.328690809 +0000 UTC m=+39.584636848" May 10 00:51:11.332321 env[1194]: 2025-05-10 00:51:11.105 [INFO][3720] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0 calico-apiserver-54f5dc6b49- calico-apiserver 4c30e8b1-96d4-49c5-bb53-9f29c6d5985e 843 0 2025-05-10 00:50:43 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:54f5dc6b49 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-09020fac35 calico-apiserver-54f5dc6b49-sst45 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali8b13b1da469 [] []}} ContainerID="a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d" Namespace="calico-apiserver" Pod="calico-apiserver-54f5dc6b49-sst45" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-" May 10 00:51:11.332321 env[1194]: 2025-05-10 00:51:11.105 [INFO][3720] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d" Namespace="calico-apiserver" Pod="calico-apiserver-54f5dc6b49-sst45" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0" May 10 00:51:11.332321 env[1194]: 2025-05-10 00:51:11.153 [INFO][3733] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d" HandleID="k8s-pod-network.a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0" May 10 00:51:11.332321 env[1194]: 2025-05-10 00:51:11.171 [INFO][3733] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d" HandleID="k8s-pod-network.a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003194b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-09020fac35", "pod":"calico-apiserver-54f5dc6b49-sst45", "timestamp":"2025-05-10 00:51:11.153523353 +0000 UTC"}, Hostname:"ci-3510.3.7-n-09020fac35", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:51:11.332321 env[1194]: 2025-05-10 00:51:11.171 [INFO][3733] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:11.332321 env[1194]: 2025-05-10 00:51:11.191 [INFO][3733] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:11.332321 env[1194]: 2025-05-10 00:51:11.191 [INFO][3733] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-09020fac35' May 10 00:51:11.332321 env[1194]: 2025-05-10 00:51:11.202 [INFO][3733] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d" host="ci-3510.3.7-n-09020fac35" May 10 00:51:11.332321 env[1194]: 2025-05-10 00:51:11.266 [INFO][3733] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-09020fac35" May 10 00:51:11.332321 env[1194]: 2025-05-10 00:51:11.274 [INFO][3733] ipam/ipam.go 489: Trying affinity for 192.168.64.64/26 host="ci-3510.3.7-n-09020fac35" May 10 00:51:11.332321 env[1194]: 2025-05-10 00:51:11.277 [INFO][3733] ipam/ipam.go 155: Attempting to load block cidr=192.168.64.64/26 host="ci-3510.3.7-n-09020fac35" May 10 00:51:11.332321 env[1194]: 2025-05-10 00:51:11.281 [INFO][3733] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.64/26 host="ci-3510.3.7-n-09020fac35" May 10 00:51:11.332321 env[1194]: 2025-05-10 00:51:11.281 [INFO][3733] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.64/26 handle="k8s-pod-network.a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d" host="ci-3510.3.7-n-09020fac35" May 10 00:51:11.332321 env[1194]: 2025-05-10 00:51:11.285 [INFO][3733] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d May 10 00:51:11.332321 env[1194]: 2025-05-10 00:51:11.290 [INFO][3733] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.64.64/26 handle="k8s-pod-network.a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d" host="ci-3510.3.7-n-09020fac35" May 10 00:51:11.332321 env[1194]: 2025-05-10 00:51:11.300 [INFO][3733] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.64.67/26] block=192.168.64.64/26 handle="k8s-pod-network.a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d" host="ci-3510.3.7-n-09020fac35" May 10 00:51:11.332321 env[1194]: 2025-05-10 00:51:11.300 [INFO][3733] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.67/26] handle="k8s-pod-network.a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d" host="ci-3510.3.7-n-09020fac35" May 10 00:51:11.332321 env[1194]: 2025-05-10 00:51:11.300 [INFO][3733] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:11.332321 env[1194]: 2025-05-10 00:51:11.300 [INFO][3733] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.64.67/26] IPv6=[] ContainerID="a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d" HandleID="k8s-pod-network.a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0" May 10 00:51:11.333310 env[1194]: 2025-05-10 00:51:11.302 [INFO][3720] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d" Namespace="calico-apiserver" Pod="calico-apiserver-54f5dc6b49-sst45" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0", GenerateName:"calico-apiserver-54f5dc6b49-", Namespace:"calico-apiserver", SelfLink:"", UID:"4c30e8b1-96d4-49c5-bb53-9f29c6d5985e", ResourceVersion:"843", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54f5dc6b49", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"", Pod:"calico-apiserver-54f5dc6b49-sst45", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8b13b1da469", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:11.333310 env[1194]: 2025-05-10 00:51:11.303 [INFO][3720] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.64.67/32] ContainerID="a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d" Namespace="calico-apiserver" Pod="calico-apiserver-54f5dc6b49-sst45" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0" May 10 00:51:11.333310 env[1194]: 2025-05-10 00:51:11.303 [INFO][3720] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8b13b1da469 ContainerID="a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d" Namespace="calico-apiserver" Pod="calico-apiserver-54f5dc6b49-sst45" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0" May 10 00:51:11.333310 env[1194]: 2025-05-10 00:51:11.304 [INFO][3720] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d" Namespace="calico-apiserver" Pod="calico-apiserver-54f5dc6b49-sst45" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0" May 10 00:51:11.333310 env[1194]: 2025-05-10 00:51:11.316 [INFO][3720] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d" Namespace="calico-apiserver" Pod="calico-apiserver-54f5dc6b49-sst45" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0", GenerateName:"calico-apiserver-54f5dc6b49-", Namespace:"calico-apiserver", SelfLink:"", UID:"4c30e8b1-96d4-49c5-bb53-9f29c6d5985e", ResourceVersion:"843", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54f5dc6b49", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d", Pod:"calico-apiserver-54f5dc6b49-sst45", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8b13b1da469", MAC:"2a:ef:55:54:e0:1a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:11.333310 env[1194]: 2025-05-10 00:51:11.330 [INFO][3720] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d" Namespace="calico-apiserver" Pod="calico-apiserver-54f5dc6b49-sst45" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0" May 10 00:51:11.345000 audit[3752]: NETFILTER_CFG table=filter:107 family=2 entries=10 op=nft_register_rule pid=3752 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:11.345000 audit[3752]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff0845a6d0 a2=0 a3=7fff0845a6bc items=0 ppid=2058 pid=3752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:11.345000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:11.353000 audit[3752]: NETFILTER_CFG table=nat:108 family=2 entries=44 op=nft_register_rule pid=3752 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:11.353000 audit[3752]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff0845a6d0 a2=0 a3=7fff0845a6bc items=0 ppid=2058 pid=3752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:11.353000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:11.362466 env[1194]: time="2025-05-10T00:51:11.362360056Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:51:11.362466 env[1194]: time="2025-05-10T00:51:11.362422612Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:51:11.362722 env[1194]: time="2025-05-10T00:51:11.362465066Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:51:11.362986 env[1194]: time="2025-05-10T00:51:11.362946920Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d pid=3761 runtime=io.containerd.runc.v2 May 10 00:51:11.381781 systemd[1]: Started cri-containerd-a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d.scope. May 10 00:51:11.399000 audit[3780]: NETFILTER_CFG table=filter:109 family=2 entries=54 op=nft_register_chain pid=3780 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:11.399000 audit[3780]: SYSCALL arch=c000003e syscall=46 success=yes exit=28720 a0=3 a1=7ffe7a0a3250 a2=0 a3=7ffe7a0a323c items=0 ppid=3290 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:11.399000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:11.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.410000 audit: BPF prog-id=171 op=LOAD May 10 00:51:11.411000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3761 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:11.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131613430393463326536613663346232613336346332363838363534 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3761 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:11.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131613430393463326536613663346232613336346332363838363534 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit: BPF prog-id=172 op=LOAD May 10 00:51:11.411000 audit[3770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002cdce0 items=0 ppid=3761 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:11.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131613430393463326536613663346232613336346332363838363534 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit: BPF prog-id=173 op=LOAD May 10 00:51:11.411000 audit[3770]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002cdd28 items=0 ppid=3761 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:11.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131613430393463326536613663346232613336346332363838363534 May 10 00:51:11.411000 audit: BPF prog-id=173 op=UNLOAD May 10 00:51:11.411000 audit: BPF prog-id=172 op=UNLOAD May 10 00:51:11.411000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:11.411000 audit: BPF prog-id=174 op=LOAD May 10 00:51:11.411000 audit[3770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d0138 items=0 ppid=3761 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:11.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131613430393463326536613663346232613336346332363838363534 May 10 00:51:11.455346 env[1194]: time="2025-05-10T00:51:11.451044322Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54f5dc6b49-sst45,Uid:4c30e8b1-96d4-49c5-bb53-9f29c6d5985e,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d\"" May 10 00:51:11.458442 env[1194]: time="2025-05-10T00:51:11.457139723Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:51:11.885980 systemd-networkd[1006]: cali9e5c3f14f8b: Gained IPv6LL May 10 00:51:11.924372 env[1194]: time="2025-05-10T00:51:11.924319985Z" level=info msg="StopPodSandbox for \"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\"" May 10 00:51:11.925332 env[1194]: time="2025-05-10T00:51:11.924342710Z" level=info msg="StopPodSandbox for \"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\"" May 10 00:51:12.140752 env[1194]: 2025-05-10 00:51:12.028 [INFO][3823] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" May 10 00:51:12.140752 env[1194]: 2025-05-10 00:51:12.028 [INFO][3823] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" iface="eth0" netns="/var/run/netns/cni-f3c2b117-cec9-5d5a-a4c1-ba510132bc2b" May 10 00:51:12.140752 env[1194]: 2025-05-10 00:51:12.028 [INFO][3823] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" iface="eth0" netns="/var/run/netns/cni-f3c2b117-cec9-5d5a-a4c1-ba510132bc2b" May 10 00:51:12.140752 env[1194]: 2025-05-10 00:51:12.029 [INFO][3823] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" iface="eth0" netns="/var/run/netns/cni-f3c2b117-cec9-5d5a-a4c1-ba510132bc2b" May 10 00:51:12.140752 env[1194]: 2025-05-10 00:51:12.029 [INFO][3823] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" May 10 00:51:12.140752 env[1194]: 2025-05-10 00:51:12.029 [INFO][3823] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" May 10 00:51:12.140752 env[1194]: 2025-05-10 00:51:12.111 [INFO][3841] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" HandleID="k8s-pod-network.bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" Workload="ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0" May 10 00:51:12.140752 env[1194]: 2025-05-10 00:51:12.112 [INFO][3841] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:12.140752 env[1194]: 2025-05-10 00:51:12.112 [INFO][3841] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:12.140752 env[1194]: 2025-05-10 00:51:12.125 [WARNING][3841] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" HandleID="k8s-pod-network.bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" Workload="ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0" May 10 00:51:12.140752 env[1194]: 2025-05-10 00:51:12.125 [INFO][3841] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" HandleID="k8s-pod-network.bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" Workload="ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0" May 10 00:51:12.140752 env[1194]: 2025-05-10 00:51:12.134 [INFO][3841] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:12.140752 env[1194]: 2025-05-10 00:51:12.138 [INFO][3823] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" May 10 00:51:12.142887 env[1194]: time="2025-05-10T00:51:12.142839509Z" level=info msg="TearDown network for sandbox \"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\" successfully" May 10 00:51:12.143075 env[1194]: time="2025-05-10T00:51:12.143050304Z" level=info msg="StopPodSandbox for \"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\" returns successfully" May 10 00:51:12.144416 env[1194]: time="2025-05-10T00:51:12.144371725Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h5n6j,Uid:afb76990-e60f-4e5f-9a6c-3c9209337ad5,Namespace:calico-system,Attempt:1,}" May 10 00:51:12.146643 systemd[1]: run-netns-cni\x2df3c2b117\x2dcec9\x2d5d5a\x2da4c1\x2dba510132bc2b.mount: Deactivated successfully. May 10 00:51:12.194241 kubelet[1925]: E0510 00:51:12.193661 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:51:12.196249 kubelet[1925]: E0510 00:51:12.195976 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:51:12.272756 env[1194]: 2025-05-10 00:51:12.043 [INFO][3832] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" May 10 00:51:12.272756 env[1194]: 2025-05-10 00:51:12.043 [INFO][3832] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" iface="eth0" netns="/var/run/netns/cni-559205d1-93d6-3c10-ba3c-7009262bbe97" May 10 00:51:12.272756 env[1194]: 2025-05-10 00:51:12.043 [INFO][3832] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" iface="eth0" netns="/var/run/netns/cni-559205d1-93d6-3c10-ba3c-7009262bbe97" May 10 00:51:12.272756 env[1194]: 2025-05-10 00:51:12.044 [INFO][3832] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" iface="eth0" netns="/var/run/netns/cni-559205d1-93d6-3c10-ba3c-7009262bbe97" May 10 00:51:12.272756 env[1194]: 2025-05-10 00:51:12.044 [INFO][3832] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" May 10 00:51:12.272756 env[1194]: 2025-05-10 00:51:12.044 [INFO][3832] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" May 10 00:51:12.272756 env[1194]: 2025-05-10 00:51:12.189 [INFO][3846] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" HandleID="k8s-pod-network.ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0" May 10 00:51:12.272756 env[1194]: 2025-05-10 00:51:12.190 [INFO][3846] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:12.272756 env[1194]: 2025-05-10 00:51:12.190 [INFO][3846] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:12.272756 env[1194]: 2025-05-10 00:51:12.232 [WARNING][3846] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" HandleID="k8s-pod-network.ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0" May 10 00:51:12.272756 env[1194]: 2025-05-10 00:51:12.232 [INFO][3846] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" HandleID="k8s-pod-network.ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0" May 10 00:51:12.272756 env[1194]: 2025-05-10 00:51:12.260 [INFO][3846] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:12.272756 env[1194]: 2025-05-10 00:51:12.263 [INFO][3832] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" May 10 00:51:12.273832 env[1194]: time="2025-05-10T00:51:12.273782614Z" level=info msg="TearDown network for sandbox \"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\" successfully" May 10 00:51:12.273968 env[1194]: time="2025-05-10T00:51:12.273950168Z" level=info msg="StopPodSandbox for \"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\" returns successfully" May 10 00:51:12.276207 systemd[1]: run-netns-cni\x2d559205d1\x2d93d6\x2d3c10\x2dba3c\x2d7009262bbe97.mount: Deactivated successfully. May 10 00:51:12.284241 env[1194]: time="2025-05-10T00:51:12.282857110Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-9d5ccc654-s8r27,Uid:505cbb42-c217-49c3-a63b-83b244af8ef9,Namespace:calico-system,Attempt:1,}" May 10 00:51:12.372000 audit[3879]: NETFILTER_CFG table=filter:110 family=2 entries=10 op=nft_register_rule pid=3879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:12.372000 audit[3879]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fffe4af72f0 a2=0 a3=7fffe4af72dc items=0 ppid=2058 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:12.372000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:12.391000 audit[3879]: NETFILTER_CFG table=nat:111 family=2 entries=56 op=nft_register_chain pid=3879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:12.391000 audit[3879]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fffe4af72f0 a2=0 a3=7fffe4af72dc items=0 ppid=2058 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:12.391000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:12.513833 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:51:12.514078 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali14c4b2d7bd2: link becomes ready May 10 00:51:12.515301 systemd-networkd[1006]: cali14c4b2d7bd2: Link UP May 10 00:51:12.516995 systemd-networkd[1006]: cali14c4b2d7bd2: Gained carrier May 10 00:51:12.560406 env[1194]: 2025-05-10 00:51:12.355 [INFO][3859] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0 csi-node-driver- calico-system afb76990-e60f-4e5f-9a6c-3c9209337ad5 857 0 2025-05-10 00:50:44 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.7-n-09020fac35 csi-node-driver-h5n6j eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali14c4b2d7bd2 [] []}} ContainerID="2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c" Namespace="calico-system" Pod="csi-node-driver-h5n6j" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-" May 10 00:51:12.560406 env[1194]: 2025-05-10 00:51:12.355 [INFO][3859] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c" Namespace="calico-system" Pod="csi-node-driver-h5n6j" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0" May 10 00:51:12.560406 env[1194]: 2025-05-10 00:51:12.428 [INFO][3881] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c" HandleID="k8s-pod-network.2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c" Workload="ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0" May 10 00:51:12.560406 env[1194]: 2025-05-10 00:51:12.444 [INFO][3881] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c" HandleID="k8s-pod-network.2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c" Workload="ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000290b20), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-09020fac35", "pod":"csi-node-driver-h5n6j", "timestamp":"2025-05-10 00:51:12.428363962 +0000 UTC"}, Hostname:"ci-3510.3.7-n-09020fac35", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:51:12.560406 env[1194]: 2025-05-10 00:51:12.445 [INFO][3881] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:12.560406 env[1194]: 2025-05-10 00:51:12.445 [INFO][3881] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:12.560406 env[1194]: 2025-05-10 00:51:12.445 [INFO][3881] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-09020fac35' May 10 00:51:12.560406 env[1194]: 2025-05-10 00:51:12.452 [INFO][3881] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c" host="ci-3510.3.7-n-09020fac35" May 10 00:51:12.560406 env[1194]: 2025-05-10 00:51:12.461 [INFO][3881] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-09020fac35" May 10 00:51:12.560406 env[1194]: 2025-05-10 00:51:12.472 [INFO][3881] ipam/ipam.go 489: Trying affinity for 192.168.64.64/26 host="ci-3510.3.7-n-09020fac35" May 10 00:51:12.560406 env[1194]: 2025-05-10 00:51:12.477 [INFO][3881] ipam/ipam.go 155: Attempting to load block cidr=192.168.64.64/26 host="ci-3510.3.7-n-09020fac35" May 10 00:51:12.560406 env[1194]: 2025-05-10 00:51:12.482 [INFO][3881] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.64/26 host="ci-3510.3.7-n-09020fac35" May 10 00:51:12.560406 env[1194]: 2025-05-10 00:51:12.482 [INFO][3881] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.64/26 handle="k8s-pod-network.2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c" host="ci-3510.3.7-n-09020fac35" May 10 00:51:12.560406 env[1194]: 2025-05-10 00:51:12.485 [INFO][3881] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c May 10 00:51:12.560406 env[1194]: 2025-05-10 00:51:12.495 [INFO][3881] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.64.64/26 handle="k8s-pod-network.2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c" host="ci-3510.3.7-n-09020fac35" May 10 00:51:12.560406 env[1194]: 2025-05-10 00:51:12.504 [INFO][3881] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.64.68/26] block=192.168.64.64/26 handle="k8s-pod-network.2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c" host="ci-3510.3.7-n-09020fac35" May 10 00:51:12.560406 env[1194]: 2025-05-10 00:51:12.505 [INFO][3881] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.68/26] handle="k8s-pod-network.2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c" host="ci-3510.3.7-n-09020fac35" May 10 00:51:12.560406 env[1194]: 2025-05-10 00:51:12.505 [INFO][3881] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:12.560406 env[1194]: 2025-05-10 00:51:12.505 [INFO][3881] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.64.68/26] IPv6=[] ContainerID="2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c" HandleID="k8s-pod-network.2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c" Workload="ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0" May 10 00:51:12.561966 env[1194]: 2025-05-10 00:51:12.508 [INFO][3859] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c" Namespace="calico-system" Pod="csi-node-driver-h5n6j" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"afb76990-e60f-4e5f-9a6c-3c9209337ad5", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"", Pod:"csi-node-driver-h5n6j", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.64.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali14c4b2d7bd2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:12.561966 env[1194]: 2025-05-10 00:51:12.508 [INFO][3859] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.64.68/32] ContainerID="2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c" Namespace="calico-system" Pod="csi-node-driver-h5n6j" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0" May 10 00:51:12.561966 env[1194]: 2025-05-10 00:51:12.508 [INFO][3859] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali14c4b2d7bd2 ContainerID="2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c" Namespace="calico-system" Pod="csi-node-driver-h5n6j" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0" May 10 00:51:12.561966 env[1194]: 2025-05-10 00:51:12.513 [INFO][3859] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c" Namespace="calico-system" Pod="csi-node-driver-h5n6j" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0" May 10 00:51:12.561966 env[1194]: 2025-05-10 00:51:12.518 [INFO][3859] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c" Namespace="calico-system" Pod="csi-node-driver-h5n6j" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"afb76990-e60f-4e5f-9a6c-3c9209337ad5", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c", Pod:"csi-node-driver-h5n6j", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.64.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali14c4b2d7bd2", MAC:"8e:b1:ff:9f:ad:8f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:12.561966 env[1194]: 2025-05-10 00:51:12.558 [INFO][3859] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c" Namespace="calico-system" Pod="csi-node-driver-h5n6j" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0" May 10 00:51:12.595224 env[1194]: time="2025-05-10T00:51:12.595103851Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:51:12.595224 env[1194]: time="2025-05-10T00:51:12.595176637Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:51:12.595522 env[1194]: time="2025-05-10T00:51:12.595192539Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:51:12.595614 env[1194]: time="2025-05-10T00:51:12.595481467Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c pid=3927 runtime=io.containerd.runc.v2 May 10 00:51:12.602000 audit[3937]: NETFILTER_CFG table=filter:112 family=2 entries=42 op=nft_register_chain pid=3937 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:12.602000 audit[3937]: SYSCALL arch=c000003e syscall=46 success=yes exit=21508 a0=3 a1=7ffd8a24b4f0 a2=0 a3=7ffd8a24b4dc items=0 ppid=3290 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:12.602000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:12.626269 systemd[1]: Started cri-containerd-2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c.scope. May 10 00:51:12.653834 systemd-networkd[1006]: cali8b13b1da469: Gained IPv6LL May 10 00:51:12.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.669000 audit: BPF prog-id=175 op=LOAD May 10 00:51:12.672000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.672000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3927 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:12.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263653438393861386463326339313639623637653035333030383431 May 10 00:51:12.673000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.673000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3927 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:12.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263653438393861386463326339313639623637653035333030383431 May 10 00:51:12.673000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.673000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.673000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.673000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.673000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.673000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.673000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.673000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.673000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.673000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.673000 audit: BPF prog-id=176 op=LOAD May 10 00:51:12.673000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002c5cd0 items=0 ppid=3927 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:12.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263653438393861386463326339313639623637653035333030383431 May 10 00:51:12.676000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.676000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.676000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.676000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.676000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.676000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.676000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.676000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.676000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.676000 audit: BPF prog-id=177 op=LOAD May 10 00:51:12.676000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002c5d18 items=0 ppid=3927 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:12.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263653438393861386463326339313639623637653035333030383431 May 10 00:51:12.677000 audit: BPF prog-id=177 op=UNLOAD May 10 00:51:12.677000 audit: BPF prog-id=176 op=UNLOAD May 10 00:51:12.678000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.678000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.678000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.678000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.678000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.678000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.678000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.678000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.678000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.678000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.678000 audit: BPF prog-id=178 op=LOAD May 10 00:51:12.678000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00033a128 items=0 ppid=3927 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:12.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263653438393861386463326339313639623637653035333030383431 May 10 00:51:12.707907 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali92b8f3f01b2: link becomes ready May 10 00:51:12.707390 systemd-networkd[1006]: cali92b8f3f01b2: Link UP May 10 00:51:12.707755 systemd-networkd[1006]: cali92b8f3f01b2: Gained carrier May 10 00:51:12.730206 env[1194]: time="2025-05-10T00:51:12.730141443Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h5n6j,Uid:afb76990-e60f-4e5f-9a6c-3c9209337ad5,Namespace:calico-system,Attempt:1,} returns sandbox id \"2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c\"" May 10 00:51:12.740763 env[1194]: 2025-05-10 00:51:12.423 [INFO][3870] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0 calico-kube-controllers-9d5ccc654- calico-system 505cbb42-c217-49c3-a63b-83b244af8ef9 858 0 2025-05-10 00:50:44 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:9d5ccc654 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.7-n-09020fac35 calico-kube-controllers-9d5ccc654-s8r27 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali92b8f3f01b2 [] []}} ContainerID="871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668" Namespace="calico-system" Pod="calico-kube-controllers-9d5ccc654-s8r27" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-" May 10 00:51:12.740763 env[1194]: 2025-05-10 00:51:12.423 [INFO][3870] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668" Namespace="calico-system" Pod="calico-kube-controllers-9d5ccc654-s8r27" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0" May 10 00:51:12.740763 env[1194]: 2025-05-10 00:51:12.522 [INFO][3893] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668" HandleID="k8s-pod-network.871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0" May 10 00:51:12.740763 env[1194]: 2025-05-10 00:51:12.546 [INFO][3893] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668" HandleID="k8s-pod-network.871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003db470), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-09020fac35", "pod":"calico-kube-controllers-9d5ccc654-s8r27", "timestamp":"2025-05-10 00:51:12.522264099 +0000 UTC"}, Hostname:"ci-3510.3.7-n-09020fac35", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:51:12.740763 env[1194]: 2025-05-10 00:51:12.546 [INFO][3893] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:12.740763 env[1194]: 2025-05-10 00:51:12.546 [INFO][3893] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:12.740763 env[1194]: 2025-05-10 00:51:12.546 [INFO][3893] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-09020fac35' May 10 00:51:12.740763 env[1194]: 2025-05-10 00:51:12.550 [INFO][3893] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668" host="ci-3510.3.7-n-09020fac35" May 10 00:51:12.740763 env[1194]: 2025-05-10 00:51:12.644 [INFO][3893] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-09020fac35" May 10 00:51:12.740763 env[1194]: 2025-05-10 00:51:12.658 [INFO][3893] ipam/ipam.go 489: Trying affinity for 192.168.64.64/26 host="ci-3510.3.7-n-09020fac35" May 10 00:51:12.740763 env[1194]: 2025-05-10 00:51:12.665 [INFO][3893] ipam/ipam.go 155: Attempting to load block cidr=192.168.64.64/26 host="ci-3510.3.7-n-09020fac35" May 10 00:51:12.740763 env[1194]: 2025-05-10 00:51:12.673 [INFO][3893] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.64/26 host="ci-3510.3.7-n-09020fac35" May 10 00:51:12.740763 env[1194]: 2025-05-10 00:51:12.673 [INFO][3893] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.64/26 handle="k8s-pod-network.871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668" host="ci-3510.3.7-n-09020fac35" May 10 00:51:12.740763 env[1194]: 2025-05-10 00:51:12.676 [INFO][3893] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668 May 10 00:51:12.740763 env[1194]: 2025-05-10 00:51:12.688 [INFO][3893] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.64.64/26 handle="k8s-pod-network.871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668" host="ci-3510.3.7-n-09020fac35" May 10 00:51:12.740763 env[1194]: 2025-05-10 00:51:12.697 [INFO][3893] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.64.69/26] block=192.168.64.64/26 handle="k8s-pod-network.871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668" host="ci-3510.3.7-n-09020fac35" May 10 00:51:12.740763 env[1194]: 2025-05-10 00:51:12.697 [INFO][3893] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.69/26] handle="k8s-pod-network.871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668" host="ci-3510.3.7-n-09020fac35" May 10 00:51:12.740763 env[1194]: 2025-05-10 00:51:12.698 [INFO][3893] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:12.740763 env[1194]: 2025-05-10 00:51:12.698 [INFO][3893] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.64.69/26] IPv6=[] ContainerID="871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668" HandleID="k8s-pod-network.871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0" May 10 00:51:12.741904 env[1194]: 2025-05-10 00:51:12.702 [INFO][3870] cni-plugin/k8s.go 386: Populated endpoint ContainerID="871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668" Namespace="calico-system" Pod="calico-kube-controllers-9d5ccc654-s8r27" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0", GenerateName:"calico-kube-controllers-9d5ccc654-", Namespace:"calico-system", SelfLink:"", UID:"505cbb42-c217-49c3-a63b-83b244af8ef9", ResourceVersion:"858", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"9d5ccc654", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"", Pod:"calico-kube-controllers-9d5ccc654-s8r27", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali92b8f3f01b2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:12.741904 env[1194]: 2025-05-10 00:51:12.702 [INFO][3870] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.64.69/32] ContainerID="871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668" Namespace="calico-system" Pod="calico-kube-controllers-9d5ccc654-s8r27" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0" May 10 00:51:12.741904 env[1194]: 2025-05-10 00:51:12.702 [INFO][3870] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali92b8f3f01b2 ContainerID="871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668" Namespace="calico-system" Pod="calico-kube-controllers-9d5ccc654-s8r27" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0" May 10 00:51:12.741904 env[1194]: 2025-05-10 00:51:12.708 [INFO][3870] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668" Namespace="calico-system" Pod="calico-kube-controllers-9d5ccc654-s8r27" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0" May 10 00:51:12.741904 env[1194]: 2025-05-10 00:51:12.709 [INFO][3870] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668" Namespace="calico-system" Pod="calico-kube-controllers-9d5ccc654-s8r27" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0", GenerateName:"calico-kube-controllers-9d5ccc654-", Namespace:"calico-system", SelfLink:"", UID:"505cbb42-c217-49c3-a63b-83b244af8ef9", ResourceVersion:"858", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"9d5ccc654", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668", Pod:"calico-kube-controllers-9d5ccc654-s8r27", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali92b8f3f01b2", MAC:"b6:f7:66:f5:46:4c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:12.741904 env[1194]: 2025-05-10 00:51:12.733 [INFO][3870] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668" Namespace="calico-system" Pod="calico-kube-controllers-9d5ccc654-s8r27" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0" May 10 00:51:12.771078 env[1194]: time="2025-05-10T00:51:12.770974458Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:51:12.771316 env[1194]: time="2025-05-10T00:51:12.771290421Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:51:12.769000 audit[3979]: NETFILTER_CFG table=filter:113 family=2 entries=48 op=nft_register_chain pid=3979 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:12.769000 audit[3979]: SYSCALL arch=c000003e syscall=46 success=yes exit=23852 a0=3 a1=7ffce8786550 a2=0 a3=7ffce878653c items=0 ppid=3290 pid=3979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:12.769000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:12.771665 env[1194]: time="2025-05-10T00:51:12.771610403Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:51:12.772175 env[1194]: time="2025-05-10T00:51:12.772115081Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668 pid=3980 runtime=io.containerd.runc.v2 May 10 00:51:12.789297 systemd[1]: Started cri-containerd-871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668.scope. May 10 00:51:12.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.811000 audit: BPF prog-id=179 op=LOAD May 10 00:51:12.813000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.813000 audit[3990]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3980 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:12.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837316431643733343537383865666630363434343563633635323966 May 10 00:51:12.813000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.813000 audit[3990]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3980 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:12.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837316431643733343537383865666630363434343563633635323966 May 10 00:51:12.813000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.813000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.813000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.813000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.813000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.813000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.813000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.813000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.813000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.813000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.813000 audit: BPF prog-id=180 op=LOAD May 10 00:51:12.813000 audit[3990]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00021b040 items=0 ppid=3980 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:12.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837316431643733343537383865666630363434343563633635323966 May 10 00:51:12.814000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.814000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.814000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.814000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.814000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.814000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.814000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.814000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.814000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.814000 audit: BPF prog-id=181 op=LOAD May 10 00:51:12.814000 audit[3990]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00021b088 items=0 ppid=3980 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:12.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837316431643733343537383865666630363434343563633635323966 May 10 00:51:12.815000 audit: BPF prog-id=181 op=UNLOAD May 10 00:51:12.815000 audit: BPF prog-id=180 op=UNLOAD May 10 00:51:12.815000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.815000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.815000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.815000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.815000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.815000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.815000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.815000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.815000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.815000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:12.815000 audit: BPF prog-id=182 op=LOAD May 10 00:51:12.815000 audit[3990]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00021b498 items=0 ppid=3980 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:12.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837316431643733343537383865666630363434343563633635323966 May 10 00:51:12.861391 env[1194]: time="2025-05-10T00:51:12.861320740Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-9d5ccc654-s8r27,Uid:505cbb42-c217-49c3-a63b-83b244af8ef9,Namespace:calico-system,Attempt:1,} returns sandbox id \"871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668\"" May 10 00:51:12.925932 env[1194]: time="2025-05-10T00:51:12.920363938Z" level=info msg="StopPodSandbox for \"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\"" May 10 00:51:13.061648 env[1194]: 2025-05-10 00:51:12.999 [INFO][4027] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" May 10 00:51:13.061648 env[1194]: 2025-05-10 00:51:12.999 [INFO][4027] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" iface="eth0" netns="/var/run/netns/cni-8923e3d4-4008-8fd1-0308-03b2ffc7fb62" May 10 00:51:13.061648 env[1194]: 2025-05-10 00:51:12.999 [INFO][4027] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" iface="eth0" netns="/var/run/netns/cni-8923e3d4-4008-8fd1-0308-03b2ffc7fb62" May 10 00:51:13.061648 env[1194]: 2025-05-10 00:51:12.999 [INFO][4027] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" iface="eth0" netns="/var/run/netns/cni-8923e3d4-4008-8fd1-0308-03b2ffc7fb62" May 10 00:51:13.061648 env[1194]: 2025-05-10 00:51:12.999 [INFO][4027] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" May 10 00:51:13.061648 env[1194]: 2025-05-10 00:51:12.999 [INFO][4027] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" May 10 00:51:13.061648 env[1194]: 2025-05-10 00:51:13.038 [INFO][4034] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" HandleID="k8s-pod-network.b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0" May 10 00:51:13.061648 env[1194]: 2025-05-10 00:51:13.038 [INFO][4034] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:13.061648 env[1194]: 2025-05-10 00:51:13.038 [INFO][4034] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:13.061648 env[1194]: 2025-05-10 00:51:13.052 [WARNING][4034] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" HandleID="k8s-pod-network.b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0" May 10 00:51:13.061648 env[1194]: 2025-05-10 00:51:13.052 [INFO][4034] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" HandleID="k8s-pod-network.b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0" May 10 00:51:13.061648 env[1194]: 2025-05-10 00:51:13.056 [INFO][4034] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:13.061648 env[1194]: 2025-05-10 00:51:13.059 [INFO][4027] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" May 10 00:51:13.062698 env[1194]: time="2025-05-10T00:51:13.062586388Z" level=info msg="TearDown network for sandbox \"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\" successfully" May 10 00:51:13.062919 env[1194]: time="2025-05-10T00:51:13.062869932Z" level=info msg="StopPodSandbox for \"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\" returns successfully" May 10 00:51:13.064067 env[1194]: time="2025-05-10T00:51:13.064030499Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54f5dc6b49-2fhw9,Uid:95aa6a47-b095-4d76-97b3-94e677b65c1b,Namespace:calico-apiserver,Attempt:1,}" May 10 00:51:13.177955 systemd[1]: run-netns-cni\x2d8923e3d4\x2d4008\x2d8fd1\x2d0308\x2d03b2ffc7fb62.mount: Deactivated successfully. May 10 00:51:13.204920 kubelet[1925]: E0510 00:51:13.204884 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:51:13.367931 systemd-networkd[1006]: calicd3e01df5e9: Link UP May 10 00:51:13.371710 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicd3e01df5e9: link becomes ready May 10 00:51:13.371323 systemd-networkd[1006]: calicd3e01df5e9: Gained carrier May 10 00:51:13.411262 env[1194]: 2025-05-10 00:51:13.131 [INFO][4041] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0 calico-apiserver-54f5dc6b49- calico-apiserver 95aa6a47-b095-4d76-97b3-94e677b65c1b 877 0 2025-05-10 00:50:43 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:54f5dc6b49 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-09020fac35 calico-apiserver-54f5dc6b49-2fhw9 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calicd3e01df5e9 [] []}} ContainerID="13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142" Namespace="calico-apiserver" Pod="calico-apiserver-54f5dc6b49-2fhw9" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-" May 10 00:51:13.411262 env[1194]: 2025-05-10 00:51:13.131 [INFO][4041] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142" Namespace="calico-apiserver" Pod="calico-apiserver-54f5dc6b49-2fhw9" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0" May 10 00:51:13.411262 env[1194]: 2025-05-10 00:51:13.187 [INFO][4053] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142" HandleID="k8s-pod-network.13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0" May 10 00:51:13.411262 env[1194]: 2025-05-10 00:51:13.310 [INFO][4053] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142" HandleID="k8s-pod-network.13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00011c0f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-09020fac35", "pod":"calico-apiserver-54f5dc6b49-2fhw9", "timestamp":"2025-05-10 00:51:13.18780655 +0000 UTC"}, Hostname:"ci-3510.3.7-n-09020fac35", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:51:13.411262 env[1194]: 2025-05-10 00:51:13.310 [INFO][4053] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:13.411262 env[1194]: 2025-05-10 00:51:13.310 [INFO][4053] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:13.411262 env[1194]: 2025-05-10 00:51:13.310 [INFO][4053] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-09020fac35' May 10 00:51:13.411262 env[1194]: 2025-05-10 00:51:13.314 [INFO][4053] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142" host="ci-3510.3.7-n-09020fac35" May 10 00:51:13.411262 env[1194]: 2025-05-10 00:51:13.320 [INFO][4053] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-09020fac35" May 10 00:51:13.411262 env[1194]: 2025-05-10 00:51:13.330 [INFO][4053] ipam/ipam.go 489: Trying affinity for 192.168.64.64/26 host="ci-3510.3.7-n-09020fac35" May 10 00:51:13.411262 env[1194]: 2025-05-10 00:51:13.333 [INFO][4053] ipam/ipam.go 155: Attempting to load block cidr=192.168.64.64/26 host="ci-3510.3.7-n-09020fac35" May 10 00:51:13.411262 env[1194]: 2025-05-10 00:51:13.339 [INFO][4053] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.64/26 host="ci-3510.3.7-n-09020fac35" May 10 00:51:13.411262 env[1194]: 2025-05-10 00:51:13.339 [INFO][4053] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.64/26 handle="k8s-pod-network.13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142" host="ci-3510.3.7-n-09020fac35" May 10 00:51:13.411262 env[1194]: 2025-05-10 00:51:13.342 [INFO][4053] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142 May 10 00:51:13.411262 env[1194]: 2025-05-10 00:51:13.351 [INFO][4053] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.64.64/26 handle="k8s-pod-network.13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142" host="ci-3510.3.7-n-09020fac35" May 10 00:51:13.411262 env[1194]: 2025-05-10 00:51:13.361 [INFO][4053] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.64.70/26] block=192.168.64.64/26 handle="k8s-pod-network.13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142" host="ci-3510.3.7-n-09020fac35" May 10 00:51:13.411262 env[1194]: 2025-05-10 00:51:13.361 [INFO][4053] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.70/26] handle="k8s-pod-network.13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142" host="ci-3510.3.7-n-09020fac35" May 10 00:51:13.411262 env[1194]: 2025-05-10 00:51:13.361 [INFO][4053] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:13.411262 env[1194]: 2025-05-10 00:51:13.361 [INFO][4053] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.64.70/26] IPv6=[] ContainerID="13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142" HandleID="k8s-pod-network.13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0" May 10 00:51:13.412935 env[1194]: 2025-05-10 00:51:13.364 [INFO][4041] cni-plugin/k8s.go 386: Populated endpoint ContainerID="13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142" Namespace="calico-apiserver" Pod="calico-apiserver-54f5dc6b49-2fhw9" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0", GenerateName:"calico-apiserver-54f5dc6b49-", Namespace:"calico-apiserver", SelfLink:"", UID:"95aa6a47-b095-4d76-97b3-94e677b65c1b", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54f5dc6b49", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"", Pod:"calico-apiserver-54f5dc6b49-2fhw9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicd3e01df5e9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:13.412935 env[1194]: 2025-05-10 00:51:13.364 [INFO][4041] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.64.70/32] ContainerID="13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142" Namespace="calico-apiserver" Pod="calico-apiserver-54f5dc6b49-2fhw9" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0" May 10 00:51:13.412935 env[1194]: 2025-05-10 00:51:13.364 [INFO][4041] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicd3e01df5e9 ContainerID="13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142" Namespace="calico-apiserver" Pod="calico-apiserver-54f5dc6b49-2fhw9" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0" May 10 00:51:13.412935 env[1194]: 2025-05-10 00:51:13.373 [INFO][4041] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142" Namespace="calico-apiserver" Pod="calico-apiserver-54f5dc6b49-2fhw9" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0" May 10 00:51:13.412935 env[1194]: 2025-05-10 00:51:13.375 [INFO][4041] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142" Namespace="calico-apiserver" Pod="calico-apiserver-54f5dc6b49-2fhw9" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0", GenerateName:"calico-apiserver-54f5dc6b49-", Namespace:"calico-apiserver", SelfLink:"", UID:"95aa6a47-b095-4d76-97b3-94e677b65c1b", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54f5dc6b49", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142", Pod:"calico-apiserver-54f5dc6b49-2fhw9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicd3e01df5e9", MAC:"f2:27:3e:05:63:3b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:13.412935 env[1194]: 2025-05-10 00:51:13.406 [INFO][4041] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142" Namespace="calico-apiserver" Pod="calico-apiserver-54f5dc6b49-2fhw9" WorkloadEndpoint="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0" May 10 00:51:13.434559 env[1194]: time="2025-05-10T00:51:13.431408223Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:51:13.434559 env[1194]: time="2025-05-10T00:51:13.431501324Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:51:13.434559 env[1194]: time="2025-05-10T00:51:13.431533448Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:51:13.434559 env[1194]: time="2025-05-10T00:51:13.433835842Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142 pid=4079 runtime=io.containerd.runc.v2 May 10 00:51:13.488712 systemd[1]: run-containerd-runc-k8s.io-13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142-runc.gkUkDu.mount: Deactivated successfully. May 10 00:51:13.495489 systemd[1]: Started cri-containerd-13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142.scope. May 10 00:51:13.516000 audit[4099]: NETFILTER_CFG table=filter:114 family=2 entries=42 op=nft_register_chain pid=4099 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:13.516000 audit[4099]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7ffdb1559c80 a2=0 a3=7ffdb1559c6c items=0 ppid=3290 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:13.516000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:13.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit: BPF prog-id=183 op=LOAD May 10 00:51:13.525000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4079 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:13.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623233643561323764383065363530393265393562346338633262 May 10 00:51:13.525000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=4079 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:13.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623233643561323764383065363530393265393562346338633262 May 10 00:51:13.525000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.525000 audit: BPF prog-id=184 op=LOAD May 10 00:51:13.525000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0003bc6a0 items=0 ppid=4079 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:13.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623233643561323764383065363530393265393562346338633262 May 10 00:51:13.526000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.526000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.526000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.526000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.526000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.526000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.526000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.526000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.526000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.526000 audit: BPF prog-id=185 op=LOAD May 10 00:51:13.526000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0003bc6e8 items=0 ppid=4079 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:13.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623233643561323764383065363530393265393562346338633262 May 10 00:51:13.526000 audit: BPF prog-id=185 op=UNLOAD May 10 00:51:13.526000 audit: BPF prog-id=184 op=UNLOAD May 10 00:51:13.526000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.526000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.526000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.526000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.526000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.526000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.526000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.526000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.526000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.526000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:13.526000 audit: BPF prog-id=186 op=LOAD May 10 00:51:13.526000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003bcaf8 items=0 ppid=4079 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:13.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623233643561323764383065363530393265393562346338633262 May 10 00:51:13.591676 env[1194]: time="2025-05-10T00:51:13.591583825Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54f5dc6b49-2fhw9,Uid:95aa6a47-b095-4d76-97b3-94e677b65c1b,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142\"" May 10 00:51:13.805956 systemd-networkd[1006]: cali92b8f3f01b2: Gained IPv6LL May 10 00:51:14.062009 systemd-networkd[1006]: cali14c4b2d7bd2: Gained IPv6LL May 10 00:51:14.214779 kubelet[1925]: E0510 00:51:14.214743 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:51:15.021960 systemd-networkd[1006]: calicd3e01df5e9: Gained IPv6LL May 10 00:51:15.296457 env[1194]: time="2025-05-10T00:51:15.296331047Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:15.298421 env[1194]: time="2025-05-10T00:51:15.298384898Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:15.300072 env[1194]: time="2025-05-10T00:51:15.300025571Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:15.301611 env[1194]: time="2025-05-10T00:51:15.301532104Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:51:15.302460 env[1194]: time="2025-05-10T00:51:15.302200397Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:15.304588 env[1194]: time="2025-05-10T00:51:15.304541297Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 10 00:51:15.308999 env[1194]: time="2025-05-10T00:51:15.308957710Z" level=info msg="CreateContainer within sandbox \"a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:51:15.327870 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4169132957.mount: Deactivated successfully. May 10 00:51:15.332725 env[1194]: time="2025-05-10T00:51:15.332677082Z" level=info msg="CreateContainer within sandbox \"a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"807f473c3498e0b895794415c397284476894e224635fc411b5b49b5d9f509fc\"" May 10 00:51:15.334214 env[1194]: time="2025-05-10T00:51:15.334163177Z" level=info msg="StartContainer for \"807f473c3498e0b895794415c397284476894e224635fc411b5b49b5d9f509fc\"" May 10 00:51:15.369841 systemd[1]: Started cri-containerd-807f473c3498e0b895794415c397284476894e224635fc411b5b49b5d9f509fc.scope. May 10 00:51:15.386908 systemd[1]: run-containerd-runc-k8s.io-807f473c3498e0b895794415c397284476894e224635fc411b5b49b5d9f509fc-runc.XKwNo8.mount: Deactivated successfully. May 10 00:51:15.422824 kernel: kauditd_printk_skb: 494 callbacks suppressed May 10 00:51:15.423043 kernel: audit: type=1400 audit(1746838275.414:1281): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.423093 kernel: audit: type=1400 audit(1746838275.414:1282): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.426568 kernel: audit: type=1400 audit(1746838275.415:1283): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.431847 kernel: audit: type=1400 audit(1746838275.415:1284): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.440389 kernel: audit: type=1400 audit(1746838275.415:1285): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.440756 kernel: audit: type=1400 audit(1746838275.415:1286): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.444924 kernel: audit: type=1400 audit(1746838275.415:1287): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.448907 kernel: audit: type=1400 audit(1746838275.415:1288): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.452865 kernel: audit: type=1400 audit(1746838275.415:1289): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit: BPF prog-id=187 op=LOAD May 10 00:51:15.456764 kernel: audit: type=1400 audit(1746838275.415:1290): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit[4121]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3761 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:15.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830376634373363333439386530623839353739343431356333393732 May 10 00:51:15.415000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit[4121]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3761 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:15.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830376634373363333439386530623839353739343431356333393732 May 10 00:51:15.415000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.415000 audit: BPF prog-id=188 op=LOAD May 10 00:51:15.415000 audit[4121]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00039c040 items=0 ppid=3761 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:15.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830376634373363333439386530623839353739343431356333393732 May 10 00:51:15.421000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.421000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.421000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.421000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.421000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.421000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.421000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.421000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.421000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.421000 audit: BPF prog-id=189 op=LOAD May 10 00:51:15.421000 audit[4121]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00039c088 items=0 ppid=3761 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:15.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830376634373363333439386530623839353739343431356333393732 May 10 00:51:15.421000 audit: BPF prog-id=189 op=UNLOAD May 10 00:51:15.421000 audit: BPF prog-id=188 op=UNLOAD May 10 00:51:15.421000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.421000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.421000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.421000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.421000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.421000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.421000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.421000 audit[4121]: AVC avc: denied { perfmon } for pid=4121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.421000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.421000 audit[4121]: AVC avc: denied { bpf } for pid=4121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:15.421000 audit: BPF prog-id=190 op=LOAD May 10 00:51:15.421000 audit[4121]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00039c498 items=0 ppid=3761 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:15.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830376634373363333439386530623839353739343431356333393732 May 10 00:51:15.484044 env[1194]: time="2025-05-10T00:51:15.483960516Z" level=info msg="StartContainer for \"807f473c3498e0b895794415c397284476894e224635fc411b5b49b5d9f509fc\" returns successfully" May 10 00:51:16.300000 audit[4150]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4150 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:16.300000 audit[4150]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcc4596400 a2=0 a3=7ffcc45963ec items=0 ppid=2058 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:16.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:16.305000 audit[4150]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4150 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:16.305000 audit[4150]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcc4596400 a2=0 a3=7ffcc45963ec items=0 ppid=2058 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:16.305000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:16.721465 env[1194]: time="2025-05-10T00:51:16.721401700Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:16.724171 env[1194]: time="2025-05-10T00:51:16.724102980Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:16.726250 env[1194]: time="2025-05-10T00:51:16.726195052Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:16.728408 env[1194]: time="2025-05-10T00:51:16.728316126Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:16.729232 env[1194]: time="2025-05-10T00:51:16.729171670Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 10 00:51:16.732758 env[1194]: time="2025-05-10T00:51:16.732702285Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 10 00:51:16.735852 env[1194]: time="2025-05-10T00:51:16.735790400Z" level=info msg="CreateContainer within sandbox \"2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 10 00:51:16.760323 env[1194]: time="2025-05-10T00:51:16.760260089Z" level=info msg="CreateContainer within sandbox \"2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"4af38f5b66a168d064344b57cdfc131ad8e00a6e6d2fb728188f7a5f50ec8422\"" May 10 00:51:16.761055 env[1194]: time="2025-05-10T00:51:16.760979446Z" level=info msg="StartContainer for \"4af38f5b66a168d064344b57cdfc131ad8e00a6e6d2fb728188f7a5f50ec8422\"" May 10 00:51:16.794232 systemd[1]: Started cri-containerd-4af38f5b66a168d064344b57cdfc131ad8e00a6e6d2fb728188f7a5f50ec8422.scope. May 10 00:51:16.824275 systemd[1]: run-containerd-runc-k8s.io-4af38f5b66a168d064344b57cdfc131ad8e00a6e6d2fb728188f7a5f50ec8422-runc.Yo2Eq1.mount: Deactivated successfully. May 10 00:51:16.861000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.861000 audit[4160]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f86501c4260 items=0 ppid=3927 pid=4160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:16.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461663338663562363661313638643036343334346235376364666331 May 10 00:51:16.861000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.861000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.861000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.861000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.861000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.861000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.861000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.861000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.861000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.861000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.861000 audit: BPF prog-id=191 op=LOAD May 10 00:51:16.861000 audit[4160]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000313758 items=0 ppid=3927 pid=4160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:16.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461663338663562363661313638643036343334346235376364666331 May 10 00:51:16.861000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.861000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.861000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.861000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.861000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.861000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.861000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.861000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.861000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.861000 audit: BPF prog-id=192 op=LOAD May 10 00:51:16.861000 audit[4160]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003137a8 items=0 ppid=3927 pid=4160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:16.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461663338663562363661313638643036343334346235376364666331 May 10 00:51:16.862000 audit: BPF prog-id=192 op=UNLOAD May 10 00:51:16.862000 audit: BPF prog-id=191 op=UNLOAD May 10 00:51:16.862000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.862000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.862000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.862000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.862000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.862000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.862000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.862000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.862000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.862000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:16.862000 audit: BPF prog-id=193 op=LOAD May 10 00:51:16.862000 audit[4160]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000313838 items=0 ppid=3927 pid=4160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:16.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461663338663562363661313638643036343334346235376364666331 May 10 00:51:16.888016 env[1194]: time="2025-05-10T00:51:16.887859698Z" level=info msg="StartContainer for \"4af38f5b66a168d064344b57cdfc131ad8e00a6e6d2fb728188f7a5f50ec8422\" returns successfully" May 10 00:51:17.268000 audit[4131]: AVC avc: denied { watch } for pid=4131 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_50_56.1168680679/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c37 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c21,c37 tclass=file permissive=0 May 10 00:51:17.268000 audit[4131]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00045e660 a2=fc6 a3=0 items=0 ppid=3761 pid=4131 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c37 key=(null) May 10 00:51:17.268000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:51:17.308976 kubelet[1925]: I0510 00:51:17.308702 1925 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-54f5dc6b49-sst45" podStartSLOduration=30.461873182 podStartE2EDuration="34.3086636s" podCreationTimestamp="2025-05-10 00:50:43 +0000 UTC" firstStartedPulling="2025-05-10 00:51:11.456636795 +0000 UTC m=+39.712582820" lastFinishedPulling="2025-05-10 00:51:15.303427197 +0000 UTC m=+43.559373238" observedRunningTime="2025-05-10 00:51:16.258481934 +0000 UTC m=+44.514427986" watchObservedRunningTime="2025-05-10 00:51:17.3086636 +0000 UTC m=+45.564609642" May 10 00:51:17.351000 audit[4189]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4189 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:17.351000 audit[4189]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffcf73072f0 a2=0 a3=7ffcf73072dc items=0 ppid=2058 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:17.351000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:17.357000 audit[4189]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=4189 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:17.357000 audit[4189]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffcf73072f0 a2=0 a3=7ffcf73072dc items=0 ppid=2058 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:17.357000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:19.718516 env[1194]: time="2025-05-10T00:51:19.718448102Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:19.721828 env[1194]: time="2025-05-10T00:51:19.721772677Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:19.724714 env[1194]: time="2025-05-10T00:51:19.724658103Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:19.727256 env[1194]: time="2025-05-10T00:51:19.727204595Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:19.728280 env[1194]: time="2025-05-10T00:51:19.728229336Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 10 00:51:19.730547 env[1194]: time="2025-05-10T00:51:19.730498082Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:51:19.769012 env[1194]: time="2025-05-10T00:51:19.768950019Z" level=info msg="CreateContainer within sandbox \"871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 10 00:51:19.789365 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3132626866.mount: Deactivated successfully. May 10 00:51:19.792757 env[1194]: time="2025-05-10T00:51:19.792696234Z" level=info msg="CreateContainer within sandbox \"871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"2ad40a3c1dae0077d8cfd7593ad639b53408ca5e23340fb24a3fe1187539d2ae\"" May 10 00:51:19.794019 env[1194]: time="2025-05-10T00:51:19.793974472Z" level=info msg="StartContainer for \"2ad40a3c1dae0077d8cfd7593ad639b53408ca5e23340fb24a3fe1187539d2ae\"" May 10 00:51:19.822247 systemd[1]: Started cri-containerd-2ad40a3c1dae0077d8cfd7593ad639b53408ca5e23340fb24a3fe1187539d2ae.scope. May 10 00:51:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.844000 audit: BPF prog-id=194 op=LOAD May 10 00:51:19.846000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.846000 audit[4209]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3980 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:19.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261643430613363316461653030373764386366643735393361643633 May 10 00:51:19.846000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.846000 audit[4209]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3980 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:19.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261643430613363316461653030373764386366643735393361643633 May 10 00:51:19.847000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.847000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.847000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.847000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.847000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.847000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.847000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.847000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.847000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.847000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.847000 audit: BPF prog-id=195 op=LOAD May 10 00:51:19.847000 audit[4209]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a3390 items=0 ppid=3980 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:19.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261643430613363316461653030373764386366643735393361643633 May 10 00:51:19.848000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.848000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.848000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.848000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.848000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.848000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.848000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.848000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.848000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.848000 audit: BPF prog-id=196 op=LOAD May 10 00:51:19.848000 audit[4209]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a33d8 items=0 ppid=3980 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:19.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261643430613363316461653030373764386366643735393361643633 May 10 00:51:19.848000 audit: BPF prog-id=196 op=UNLOAD May 10 00:51:19.849000 audit: BPF prog-id=195 op=UNLOAD May 10 00:51:19.849000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.849000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.849000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.849000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.849000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.849000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.849000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.849000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.849000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.849000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:19.849000 audit: BPF prog-id=197 op=LOAD May 10 00:51:19.849000 audit[4209]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002a37e8 items=0 ppid=3980 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:19.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261643430613363316461653030373764386366643735393361643633 May 10 00:51:19.891615 env[1194]: time="2025-05-10T00:51:19.891475011Z" level=info msg="StartContainer for \"2ad40a3c1dae0077d8cfd7593ad639b53408ca5e23340fb24a3fe1187539d2ae\" returns successfully" May 10 00:51:20.071120 env[1194]: time="2025-05-10T00:51:20.071006930Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:20.072744 env[1194]: time="2025-05-10T00:51:20.072689530Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:20.074577 env[1194]: time="2025-05-10T00:51:20.074488935Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:20.077477 env[1194]: time="2025-05-10T00:51:20.077407394Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:20.078457 env[1194]: time="2025-05-10T00:51:20.078402827Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:51:20.082180 env[1194]: time="2025-05-10T00:51:20.080851410Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 10 00:51:20.083751 env[1194]: time="2025-05-10T00:51:20.083688760Z" level=info msg="CreateContainer within sandbox \"13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:51:20.100217 env[1194]: time="2025-05-10T00:51:20.100151170Z" level=info msg="CreateContainer within sandbox \"13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"707a439f0e0848a91302aeac973646ca4e30cfcee0799acb6e71c3596a6dcf0a\"" May 10 00:51:20.102518 env[1194]: time="2025-05-10T00:51:20.101956441Z" level=info msg="StartContainer for \"707a439f0e0848a91302aeac973646ca4e30cfcee0799acb6e71c3596a6dcf0a\"" May 10 00:51:20.128369 systemd[1]: Started cri-containerd-707a439f0e0848a91302aeac973646ca4e30cfcee0799acb6e71c3596a6dcf0a.scope. May 10 00:51:20.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit: BPF prog-id=198 op=LOAD May 10 00:51:20.151000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit[4246]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4079 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:20.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730376134333966306530383438613931333032616561633937333634 May 10 00:51:20.151000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit[4246]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4079 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:20.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730376134333966306530383438613931333032616561633937333634 May 10 00:51:20.151000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit: BPF prog-id=199 op=LOAD May 10 00:51:20.151000 audit[4246]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000effc0 items=0 ppid=4079 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:20.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730376134333966306530383438613931333032616561633937333634 May 10 00:51:20.151000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.151000 audit: BPF prog-id=200 op=LOAD May 10 00:51:20.151000 audit[4246]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003e6008 items=0 ppid=4079 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:20.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730376134333966306530383438613931333032616561633937333634 May 10 00:51:20.151000 audit: BPF prog-id=200 op=UNLOAD May 10 00:51:20.152000 audit: BPF prog-id=199 op=UNLOAD May 10 00:51:20.152000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.152000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.152000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.152000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.152000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.152000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.152000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.152000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.152000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.152000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:20.152000 audit: BPF prog-id=201 op=LOAD May 10 00:51:20.152000 audit[4246]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003e6418 items=0 ppid=4079 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:20.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730376134333966306530383438613931333032616561633937333634 May 10 00:51:20.204767 env[1194]: time="2025-05-10T00:51:20.202731395Z" level=info msg="StartContainer for \"707a439f0e0848a91302aeac973646ca4e30cfcee0799acb6e71c3596a6dcf0a\" returns successfully" May 10 00:51:20.260793 kubelet[1925]: I0510 00:51:20.260717 1925 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-54f5dc6b49-2fhw9" podStartSLOduration=30.774268271 podStartE2EDuration="37.260694095s" podCreationTimestamp="2025-05-10 00:50:43 +0000 UTC" firstStartedPulling="2025-05-10 00:51:13.593732969 +0000 UTC m=+41.849679002" lastFinishedPulling="2025-05-10 00:51:20.0801588 +0000 UTC m=+48.336104826" observedRunningTime="2025-05-10 00:51:20.260486938 +0000 UTC m=+48.516432987" watchObservedRunningTime="2025-05-10 00:51:20.260694095 +0000 UTC m=+48.516640141" May 10 00:51:20.333000 audit[4293]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4293 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:20.333000 audit[4293]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffca8a511f0 a2=0 a3=7ffca8a511dc items=0 ppid=2058 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:20.333000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:20.339000 audit[4293]: NETFILTER_CFG table=nat:120 family=2 entries=30 op=nft_register_rule pid=4293 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:20.339000 audit[4293]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffca8a511f0 a2=0 a3=7ffca8a511dc items=0 ppid=2058 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:20.339000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:20.399370 kubelet[1925]: I0510 00:51:20.399271 1925 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-9d5ccc654-s8r27" podStartSLOduration=29.532525098 podStartE2EDuration="36.39924006s" podCreationTimestamp="2025-05-10 00:50:44 +0000 UTC" firstStartedPulling="2025-05-10 00:51:12.863378735 +0000 UTC m=+41.119324773" lastFinishedPulling="2025-05-10 00:51:19.730093697 +0000 UTC m=+47.986039735" observedRunningTime="2025-05-10 00:51:20.303982141 +0000 UTC m=+48.559928189" watchObservedRunningTime="2025-05-10 00:51:20.39924006 +0000 UTC m=+48.655186108" May 10 00:51:21.254183 kubelet[1925]: I0510 00:51:21.254124 1925 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:51:21.321000 audit[4257]: AVC avc: denied { watch } for pid=4257 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_50_56.2109011056/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c778,c913 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c778,c913 tclass=file permissive=0 May 10 00:51:21.323856 kernel: kauditd_printk_skb: 225 callbacks suppressed May 10 00:51:21.324003 kernel: audit: type=1400 audit(1746838281.321:1348): avc: denied { watch } for pid=4257 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_50_56.2109011056/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c778,c913 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c778,c913 tclass=file permissive=0 May 10 00:51:21.321000 audit[4257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001255f40 a2=fc6 a3=0 items=0 ppid=4079 pid=4257 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c778,c913 key=(null) May 10 00:51:21.331146 kernel: audit: type=1300 audit(1746838281.321:1348): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001255f40 a2=fc6 a3=0 items=0 ppid=4079 pid=4257 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c778,c913 key=(null) May 10 00:51:21.331679 kernel: audit: type=1327 audit(1746838281.321:1348): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:51:21.321000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:51:22.138718 env[1194]: time="2025-05-10T00:51:22.138582953Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:22.141129 env[1194]: time="2025-05-10T00:51:22.141053603Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:22.143126 env[1194]: time="2025-05-10T00:51:22.142972427Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:22.145388 env[1194]: time="2025-05-10T00:51:22.145319404Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:22.146406 env[1194]: time="2025-05-10T00:51:22.146321044Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 10 00:51:22.152186 env[1194]: time="2025-05-10T00:51:22.152117864Z" level=info msg="CreateContainer within sandbox \"2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 10 00:51:22.177027 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2544283939.mount: Deactivated successfully. May 10 00:51:22.179919 env[1194]: time="2025-05-10T00:51:22.179842432Z" level=info msg="CreateContainer within sandbox \"2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"2ad343aced5bed39348e3c5c33c75282c57cb64a2cd8bf1c97efa44dc9318f43\"" May 10 00:51:22.181993 env[1194]: time="2025-05-10T00:51:22.180686679Z" level=info msg="StartContainer for \"2ad343aced5bed39348e3c5c33c75282c57cb64a2cd8bf1c97efa44dc9318f43\"" May 10 00:51:22.219810 systemd[1]: Started cri-containerd-2ad343aced5bed39348e3c5c33c75282c57cb64a2cd8bf1c97efa44dc9318f43.scope. May 10 00:51:22.249000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.255539 kernel: audit: type=1400 audit(1746838282.249:1349): avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.249000 audit[4307]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa548269a88 items=0 ppid=3927 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:22.273411 kernel: audit: type=1300 audit(1746838282.249:1349): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa548269a88 items=0 ppid=3927 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:22.273575 kernel: audit: type=1327 audit(1746838282.249:1349): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261643334336163656435626564333933343865336335633333633735 May 10 00:51:22.274065 kernel: audit: type=1400 audit(1746838282.259:1350): avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261643334336163656435626564333933343865336335633333633735 May 10 00:51:22.259000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.259000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.280423 kernel: audit: type=1400 audit(1746838282.259:1350): avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.280593 kernel: audit: type=1400 audit(1746838282.259:1350): avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.259000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.259000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.283724 kernel: audit: type=1400 audit(1746838282.259:1350): avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.259000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.259000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.259000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.259000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.259000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.259000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.259000 audit: BPF prog-id=202 op=LOAD May 10 00:51:22.259000 audit[4307]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00030c688 items=0 ppid=3927 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:22.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261643334336163656435626564333933343865336335633333633735 May 10 00:51:22.259000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.259000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.259000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.259000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.259000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.259000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.259000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.259000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.259000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.259000 audit: BPF prog-id=203 op=LOAD May 10 00:51:22.259000 audit[4307]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00030c6d8 items=0 ppid=3927 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:22.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261643334336163656435626564333933343865336335633333633735 May 10 00:51:22.272000 audit: BPF prog-id=203 op=UNLOAD May 10 00:51:22.272000 audit: BPF prog-id=202 op=UNLOAD May 10 00:51:22.272000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.272000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.272000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.272000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.272000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.272000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.272000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.272000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.272000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.272000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:22.272000 audit: BPF prog-id=204 op=LOAD May 10 00:51:22.272000 audit[4307]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000396ef0 items=0 ppid=3927 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:22.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261643334336163656435626564333933343865336335633333633735 May 10 00:51:22.302835 env[1194]: time="2025-05-10T00:51:22.302768919Z" level=info msg="StartContainer for \"2ad343aced5bed39348e3c5c33c75282c57cb64a2cd8bf1c97efa44dc9318f43\" returns successfully" May 10 00:51:23.231105 kubelet[1925]: I0510 00:51:23.231030 1925 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 10 00:51:23.234530 kubelet[1925]: I0510 00:51:23.234464 1925 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 10 00:51:23.290509 kubelet[1925]: I0510 00:51:23.290451 1925 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-h5n6j" podStartSLOduration=29.874881906 podStartE2EDuration="39.290432188s" podCreationTimestamp="2025-05-10 00:50:44 +0000 UTC" firstStartedPulling="2025-05-10 00:51:12.732700622 +0000 UTC m=+40.988646649" lastFinishedPulling="2025-05-10 00:51:22.148250888 +0000 UTC m=+50.404196931" observedRunningTime="2025-05-10 00:51:23.288538999 +0000 UTC m=+51.544485045" watchObservedRunningTime="2025-05-10 00:51:23.290432188 +0000 UTC m=+51.546378234" May 10 00:51:26.444088 kubelet[1925]: I0510 00:51:26.444037 1925 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:51:26.514559 kernel: kauditd_printk_skb: 36 callbacks suppressed May 10 00:51:26.514765 kernel: audit: type=1325 audit(1746838286.509:1355): table=filter:121 family=2 entries=8 op=nft_register_rule pid=4343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:26.509000 audit[4343]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=4343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:26.509000 audit[4343]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffd31cc7c0 a2=0 a3=7fffd31cc7ac items=0 ppid=2058 pid=4343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:26.509000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:26.521417 kernel: audit: type=1300 audit(1746838286.509:1355): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffd31cc7c0 a2=0 a3=7fffd31cc7ac items=0 ppid=2058 pid=4343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:26.521559 kernel: audit: type=1327 audit(1746838286.509:1355): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:26.523000 audit[4343]: NETFILTER_CFG table=nat:122 family=2 entries=34 op=nft_register_chain pid=4343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:26.523000 audit[4343]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffd31cc7c0 a2=0 a3=7fffd31cc7ac items=0 ppid=2058 pid=4343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:26.531356 kernel: audit: type=1325 audit(1746838286.523:1356): table=nat:122 family=2 entries=34 op=nft_register_chain pid=4343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:26.531581 kernel: audit: type=1300 audit(1746838286.523:1356): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffd31cc7c0 a2=0 a3=7fffd31cc7ac items=0 ppid=2058 pid=4343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:26.531649 kernel: audit: type=1327 audit(1746838286.523:1356): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:26.523000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:26.952000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:26.952000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00208b380 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:51:26.961410 kernel: audit: type=1400 audit(1746838286.952:1357): avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:26.961574 kernel: audit: type=1300 audit(1746838286.952:1357): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00208b380 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:51:26.961604 kernel: audit: type=1327 audit(1746838286.952:1357): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:51:26.952000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:51:26.952000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:26.967784 kernel: audit: type=1400 audit(1746838286.952:1358): avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:26.952000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021caff0 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:51:26.952000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:51:27.674000 audit[1784]: AVC avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:27.674000 audit[1784]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c009dd04b0 a2=fc6 a3=0 items=0 ppid=1626 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 key=(null) May 10 00:51:27.674000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 10 00:51:27.685000 audit[1784]: AVC avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:27.685000 audit[1784]: AVC avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:27.685000 audit[1784]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c005e855e0 a2=fc6 a3=0 items=0 ppid=1626 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 key=(null) May 10 00:51:27.685000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 10 00:51:27.685000 audit[1784]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c009dd0540 a2=fc6 a3=0 items=0 ppid=1626 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 key=(null) May 10 00:51:27.685000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 10 00:51:27.709000 audit[1784]: AVC avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:27.709000 audit[1784]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c006648000 a2=fc6 a3=0 items=0 ppid=1626 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 key=(null) May 10 00:51:27.709000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 10 00:51:27.753000 audit[1784]: AVC avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:27.753000 audit[1784]: AVC avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:27.753000 audit[1784]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c009dd06f0 a2=fc6 a3=0 items=0 ppid=1626 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 key=(null) May 10 00:51:27.753000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 10 00:51:27.753000 audit[1784]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c005e85620 a2=fc6 a3=0 items=0 ppid=1626 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 key=(null) May 10 00:51:27.753000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 10 00:51:29.578187 systemd[1]: run-containerd-runc-k8s.io-2ad40a3c1dae0077d8cfd7593ad639b53408ca5e23340fb24a3fe1187539d2ae-runc.oLSAkd.mount: Deactivated successfully. May 10 00:51:31.960540 env[1194]: time="2025-05-10T00:51:31.960477995Z" level=info msg="StopPodSandbox for \"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\"" May 10 00:51:32.228738 env[1194]: 2025-05-10 00:51:32.157 [WARNING][4385] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"309470cc-1a19-4c2f-ac9a-68ac7d4eb559", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d", Pod:"coredns-668d6bf9bc-8729n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9e5c3f14f8b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:32.228738 env[1194]: 2025-05-10 00:51:32.159 [INFO][4385] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" May 10 00:51:32.228738 env[1194]: 2025-05-10 00:51:32.159 [INFO][4385] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" iface="eth0" netns="" May 10 00:51:32.228738 env[1194]: 2025-05-10 00:51:32.159 [INFO][4385] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" May 10 00:51:32.228738 env[1194]: 2025-05-10 00:51:32.159 [INFO][4385] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" May 10 00:51:32.228738 env[1194]: 2025-05-10 00:51:32.209 [INFO][4392] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" HandleID="k8s-pod-network.4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0" May 10 00:51:32.228738 env[1194]: 2025-05-10 00:51:32.209 [INFO][4392] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:32.228738 env[1194]: 2025-05-10 00:51:32.209 [INFO][4392] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:32.228738 env[1194]: 2025-05-10 00:51:32.217 [WARNING][4392] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" HandleID="k8s-pod-network.4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0" May 10 00:51:32.228738 env[1194]: 2025-05-10 00:51:32.217 [INFO][4392] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" HandleID="k8s-pod-network.4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0" May 10 00:51:32.228738 env[1194]: 2025-05-10 00:51:32.220 [INFO][4392] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:32.228738 env[1194]: 2025-05-10 00:51:32.225 [INFO][4385] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" May 10 00:51:32.230384 env[1194]: time="2025-05-10T00:51:32.230322795Z" level=info msg="TearDown network for sandbox \"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\" successfully" May 10 00:51:32.230550 env[1194]: time="2025-05-10T00:51:32.230510968Z" level=info msg="StopPodSandbox for \"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\" returns successfully" May 10 00:51:32.231594 env[1194]: time="2025-05-10T00:51:32.231549126Z" level=info msg="RemovePodSandbox for \"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\"" May 10 00:51:32.232038 env[1194]: time="2025-05-10T00:51:32.231889707Z" level=info msg="Forcibly stopping sandbox \"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\"" May 10 00:51:32.358431 env[1194]: 2025-05-10 00:51:32.301 [WARNING][4414] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"309470cc-1a19-4c2f-ac9a-68ac7d4eb559", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"f8130dfbb145865fa7ac20b5a63115ce7aabdb079ab776ba1ad2a780ff56af5d", Pod:"coredns-668d6bf9bc-8729n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9e5c3f14f8b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:32.358431 env[1194]: 2025-05-10 00:51:32.301 [INFO][4414] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" May 10 00:51:32.358431 env[1194]: 2025-05-10 00:51:32.301 [INFO][4414] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" iface="eth0" netns="" May 10 00:51:32.358431 env[1194]: 2025-05-10 00:51:32.301 [INFO][4414] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" May 10 00:51:32.358431 env[1194]: 2025-05-10 00:51:32.301 [INFO][4414] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" May 10 00:51:32.358431 env[1194]: 2025-05-10 00:51:32.339 [INFO][4421] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" HandleID="k8s-pod-network.4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0" May 10 00:51:32.358431 env[1194]: 2025-05-10 00:51:32.339 [INFO][4421] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:32.358431 env[1194]: 2025-05-10 00:51:32.339 [INFO][4421] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:32.358431 env[1194]: 2025-05-10 00:51:32.350 [WARNING][4421] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" HandleID="k8s-pod-network.4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0" May 10 00:51:32.358431 env[1194]: 2025-05-10 00:51:32.350 [INFO][4421] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" HandleID="k8s-pod-network.4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--8729n-eth0" May 10 00:51:32.358431 env[1194]: 2025-05-10 00:51:32.352 [INFO][4421] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:32.358431 env[1194]: 2025-05-10 00:51:32.355 [INFO][4414] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94" May 10 00:51:32.359999 env[1194]: time="2025-05-10T00:51:32.358487468Z" level=info msg="TearDown network for sandbox \"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\" successfully" May 10 00:51:32.363541 env[1194]: time="2025-05-10T00:51:32.363470674Z" level=info msg="RemovePodSandbox \"4db828d94bea4e264f08ad00c8e12f096ac9080bbc6b9cc8cb591377c0417f94\" returns successfully" May 10 00:51:32.364476 env[1194]: time="2025-05-10T00:51:32.364420415Z" level=info msg="StopPodSandbox for \"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\"" May 10 00:51:32.433577 systemd[1]: Started sshd@7-146.190.154.235:22-139.178.68.195:51744.service. May 10 00:51:32.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-146.190.154.235:22-139.178.68.195:51744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:32.435202 kernel: kauditd_printk_skb: 20 callbacks suppressed May 10 00:51:32.435274 kernel: audit: type=1130 audit(1746838292.432:1365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-146.190.154.235:22-139.178.68.195:51744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:32.555716 env[1194]: 2025-05-10 00:51:32.474 [WARNING][4439] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"1ea33208-eaf4-4a7e-b4f4-0abb3d6d89dd", ResourceVersion:"828", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17", Pod:"coredns-668d6bf9bc-vlx8n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali87d6849d4ba", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:32.555716 env[1194]: 2025-05-10 00:51:32.475 [INFO][4439] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" May 10 00:51:32.555716 env[1194]: 2025-05-10 00:51:32.475 [INFO][4439] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" iface="eth0" netns="" May 10 00:51:32.555716 env[1194]: 2025-05-10 00:51:32.475 [INFO][4439] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" May 10 00:51:32.555716 env[1194]: 2025-05-10 00:51:32.475 [INFO][4439] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" May 10 00:51:32.555716 env[1194]: 2025-05-10 00:51:32.535 [INFO][4448] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" HandleID="k8s-pod-network.0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0" May 10 00:51:32.555716 env[1194]: 2025-05-10 00:51:32.535 [INFO][4448] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:32.555716 env[1194]: 2025-05-10 00:51:32.535 [INFO][4448] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:32.555716 env[1194]: 2025-05-10 00:51:32.547 [WARNING][4448] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" HandleID="k8s-pod-network.0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0" May 10 00:51:32.555716 env[1194]: 2025-05-10 00:51:32.547 [INFO][4448] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" HandleID="k8s-pod-network.0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0" May 10 00:51:32.555716 env[1194]: 2025-05-10 00:51:32.550 [INFO][4448] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:32.555716 env[1194]: 2025-05-10 00:51:32.552 [INFO][4439] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" May 10 00:51:32.555716 env[1194]: time="2025-05-10T00:51:32.554661522Z" level=info msg="TearDown network for sandbox \"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\" successfully" May 10 00:51:32.555716 env[1194]: time="2025-05-10T00:51:32.554695988Z" level=info msg="StopPodSandbox for \"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\" returns successfully" May 10 00:51:32.556688 env[1194]: time="2025-05-10T00:51:32.556655929Z" level=info msg="RemovePodSandbox for \"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\"" May 10 00:51:32.556847 env[1194]: time="2025-05-10T00:51:32.556808253Z" level=info msg="Forcibly stopping sandbox \"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\"" May 10 00:51:32.564000 audit[4444]: USER_ACCT pid=4444 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:32.571734 kernel: audit: type=1101 audit(1746838292.564:1366): pid=4444 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:32.575328 kernel: audit: type=1103 audit(1746838292.570:1367): pid=4444 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:32.570000 audit[4444]: CRED_ACQ pid=4444 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:32.575506 sshd[4444]: Accepted publickey for core from 139.178.68.195 port 51744 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:51:32.578967 kernel: audit: type=1006 audit(1746838292.574:1368): pid=4444 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 10 00:51:32.579084 kernel: audit: type=1300 audit(1746838292.574:1368): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3649f450 a2=3 a3=0 items=0 ppid=1 pid=4444 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:32.574000 audit[4444]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3649f450 a2=3 a3=0 items=0 ppid=1 pid=4444 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:32.574000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:32.581687 sshd[4444]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:32.582591 kernel: audit: type=1327 audit(1746838292.574:1368): proctitle=737368643A20636F7265205B707269765D May 10 00:51:32.590831 systemd[1]: Started session-8.scope. May 10 00:51:32.591258 systemd-logind[1179]: New session 8 of user core. May 10 00:51:32.595000 audit[4444]: USER_START pid=4444 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:32.602428 kernel: audit: type=1105 audit(1746838292.595:1369): pid=4444 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:32.600000 audit[4473]: CRED_ACQ pid=4473 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:32.608025 kernel: audit: type=1103 audit(1746838292.600:1370): pid=4473 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:32.720738 env[1194]: 2025-05-10 00:51:32.646 [WARNING][4468] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"1ea33208-eaf4-4a7e-b4f4-0abb3d6d89dd", ResourceVersion:"828", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"89d5b5ce68be484fe36b3055f66dbeac0329cdf35358ae13469c223a1f811e17", Pod:"coredns-668d6bf9bc-vlx8n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali87d6849d4ba", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:32.720738 env[1194]: 2025-05-10 00:51:32.646 [INFO][4468] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" May 10 00:51:32.720738 env[1194]: 2025-05-10 00:51:32.646 [INFO][4468] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" iface="eth0" netns="" May 10 00:51:32.720738 env[1194]: 2025-05-10 00:51:32.646 [INFO][4468] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" May 10 00:51:32.720738 env[1194]: 2025-05-10 00:51:32.646 [INFO][4468] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" May 10 00:51:32.720738 env[1194]: 2025-05-10 00:51:32.692 [INFO][4477] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" HandleID="k8s-pod-network.0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0" May 10 00:51:32.720738 env[1194]: 2025-05-10 00:51:32.693 [INFO][4477] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:32.720738 env[1194]: 2025-05-10 00:51:32.693 [INFO][4477] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:32.720738 env[1194]: 2025-05-10 00:51:32.708 [WARNING][4477] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" HandleID="k8s-pod-network.0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0" May 10 00:51:32.720738 env[1194]: 2025-05-10 00:51:32.708 [INFO][4477] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" HandleID="k8s-pod-network.0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" Workload="ci--3510.3.7--n--09020fac35-k8s-coredns--668d6bf9bc--vlx8n-eth0" May 10 00:51:32.720738 env[1194]: 2025-05-10 00:51:32.714 [INFO][4477] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:32.720738 env[1194]: 2025-05-10 00:51:32.717 [INFO][4468] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f" May 10 00:51:32.722104 env[1194]: time="2025-05-10T00:51:32.720773074Z" level=info msg="TearDown network for sandbox \"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\" successfully" May 10 00:51:32.725796 env[1194]: time="2025-05-10T00:51:32.725730740Z" level=info msg="RemovePodSandbox \"0f3ae953664cae96cd953d7f9a1db150c9a636fcc6451dc31b148088a9bd5e9f\" returns successfully" May 10 00:51:32.727454 env[1194]: time="2025-05-10T00:51:32.727415252Z" level=info msg="StopPodSandbox for \"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\"" May 10 00:51:32.935752 env[1194]: 2025-05-10 00:51:32.831 [WARNING][4499] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0", GenerateName:"calico-apiserver-54f5dc6b49-", Namespace:"calico-apiserver", SelfLink:"", UID:"95aa6a47-b095-4d76-97b3-94e677b65c1b", ResourceVersion:"950", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54f5dc6b49", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142", Pod:"calico-apiserver-54f5dc6b49-2fhw9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicd3e01df5e9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:32.935752 env[1194]: 2025-05-10 00:51:32.831 [INFO][4499] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" May 10 00:51:32.935752 env[1194]: 2025-05-10 00:51:32.832 [INFO][4499] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" iface="eth0" netns="" May 10 00:51:32.935752 env[1194]: 2025-05-10 00:51:32.833 [INFO][4499] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" May 10 00:51:32.935752 env[1194]: 2025-05-10 00:51:32.833 [INFO][4499] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" May 10 00:51:32.935752 env[1194]: 2025-05-10 00:51:32.894 [INFO][4510] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" HandleID="k8s-pod-network.b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0" May 10 00:51:32.935752 env[1194]: 2025-05-10 00:51:32.895 [INFO][4510] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:32.935752 env[1194]: 2025-05-10 00:51:32.895 [INFO][4510] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:32.935752 env[1194]: 2025-05-10 00:51:32.913 [WARNING][4510] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" HandleID="k8s-pod-network.b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0" May 10 00:51:32.935752 env[1194]: 2025-05-10 00:51:32.914 [INFO][4510] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" HandleID="k8s-pod-network.b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0" May 10 00:51:32.935752 env[1194]: 2025-05-10 00:51:32.923 [INFO][4510] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:32.935752 env[1194]: 2025-05-10 00:51:32.929 [INFO][4499] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" May 10 00:51:32.937101 env[1194]: time="2025-05-10T00:51:32.937030181Z" level=info msg="TearDown network for sandbox \"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\" successfully" May 10 00:51:32.937320 env[1194]: time="2025-05-10T00:51:32.937270995Z" level=info msg="StopPodSandbox for \"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\" returns successfully" May 10 00:51:32.939563 env[1194]: time="2025-05-10T00:51:32.938547381Z" level=info msg="RemovePodSandbox for \"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\"" May 10 00:51:32.939563 env[1194]: time="2025-05-10T00:51:32.938610423Z" level=info msg="Forcibly stopping sandbox \"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\"" May 10 00:51:33.099704 env[1194]: 2025-05-10 00:51:33.023 [WARNING][4529] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0", GenerateName:"calico-apiserver-54f5dc6b49-", Namespace:"calico-apiserver", SelfLink:"", UID:"95aa6a47-b095-4d76-97b3-94e677b65c1b", ResourceVersion:"950", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54f5dc6b49", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"13b23d5a27d80e65092e95b4c8c2bf296cf769708c97be67469cf329cbc14142", Pod:"calico-apiserver-54f5dc6b49-2fhw9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicd3e01df5e9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:33.099704 env[1194]: 2025-05-10 00:51:33.024 [INFO][4529] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" May 10 00:51:33.099704 env[1194]: 2025-05-10 00:51:33.024 [INFO][4529] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" iface="eth0" netns="" May 10 00:51:33.099704 env[1194]: 2025-05-10 00:51:33.024 [INFO][4529] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" May 10 00:51:33.099704 env[1194]: 2025-05-10 00:51:33.024 [INFO][4529] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" May 10 00:51:33.099704 env[1194]: 2025-05-10 00:51:33.079 [INFO][4537] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" HandleID="k8s-pod-network.b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0" May 10 00:51:33.099704 env[1194]: 2025-05-10 00:51:33.079 [INFO][4537] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:33.099704 env[1194]: 2025-05-10 00:51:33.079 [INFO][4537] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:33.099704 env[1194]: 2025-05-10 00:51:33.091 [WARNING][4537] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" HandleID="k8s-pod-network.b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0" May 10 00:51:33.099704 env[1194]: 2025-05-10 00:51:33.091 [INFO][4537] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" HandleID="k8s-pod-network.b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--2fhw9-eth0" May 10 00:51:33.099704 env[1194]: 2025-05-10 00:51:33.094 [INFO][4537] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:33.099704 env[1194]: 2025-05-10 00:51:33.096 [INFO][4529] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c" May 10 00:51:33.105525 env[1194]: time="2025-05-10T00:51:33.100817716Z" level=info msg="TearDown network for sandbox \"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\" successfully" May 10 00:51:33.106703 env[1194]: time="2025-05-10T00:51:33.106598106Z" level=info msg="RemovePodSandbox \"b134614e42a1ba83be8a01180a96c77db051b1bfcef5007ae34bb4e25a4ca16c\" returns successfully" May 10 00:51:33.107558 env[1194]: time="2025-05-10T00:51:33.107523528Z" level=info msg="StopPodSandbox for \"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\"" May 10 00:51:33.250902 env[1194]: 2025-05-10 00:51:33.176 [WARNING][4556] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0", GenerateName:"calico-apiserver-54f5dc6b49-", Namespace:"calico-apiserver", SelfLink:"", UID:"4c30e8b1-96d4-49c5-bb53-9f29c6d5985e", ResourceVersion:"900", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54f5dc6b49", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d", Pod:"calico-apiserver-54f5dc6b49-sst45", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8b13b1da469", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:33.250902 env[1194]: 2025-05-10 00:51:33.179 [INFO][4556] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" May 10 00:51:33.250902 env[1194]: 2025-05-10 00:51:33.180 [INFO][4556] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" iface="eth0" netns="" May 10 00:51:33.250902 env[1194]: 2025-05-10 00:51:33.180 [INFO][4556] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" May 10 00:51:33.250902 env[1194]: 2025-05-10 00:51:33.180 [INFO][4556] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" May 10 00:51:33.250902 env[1194]: 2025-05-10 00:51:33.220 [INFO][4563] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" HandleID="k8s-pod-network.8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0" May 10 00:51:33.250902 env[1194]: 2025-05-10 00:51:33.220 [INFO][4563] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:33.250902 env[1194]: 2025-05-10 00:51:33.220 [INFO][4563] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:33.250902 env[1194]: 2025-05-10 00:51:33.238 [WARNING][4563] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" HandleID="k8s-pod-network.8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0" May 10 00:51:33.250902 env[1194]: 2025-05-10 00:51:33.238 [INFO][4563] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" HandleID="k8s-pod-network.8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0" May 10 00:51:33.250902 env[1194]: 2025-05-10 00:51:33.244 [INFO][4563] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:33.250902 env[1194]: 2025-05-10 00:51:33.247 [INFO][4556] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" May 10 00:51:33.252107 env[1194]: time="2025-05-10T00:51:33.252053961Z" level=info msg="TearDown network for sandbox \"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\" successfully" May 10 00:51:33.252238 env[1194]: time="2025-05-10T00:51:33.252217995Z" level=info msg="StopPodSandbox for \"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\" returns successfully" May 10 00:51:33.253679 env[1194]: time="2025-05-10T00:51:33.253606960Z" level=info msg="RemovePodSandbox for \"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\"" May 10 00:51:33.253913 env[1194]: time="2025-05-10T00:51:33.253855597Z" level=info msg="Forcibly stopping sandbox \"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\"" May 10 00:51:33.440544 env[1194]: 2025-05-10 00:51:33.358 [WARNING][4582] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0", GenerateName:"calico-apiserver-54f5dc6b49-", Namespace:"calico-apiserver", SelfLink:"", UID:"4c30e8b1-96d4-49c5-bb53-9f29c6d5985e", ResourceVersion:"900", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54f5dc6b49", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"a1a4094c2e6a6c4b2a364c268865404b21fe6f9bdaf7312d92deda4fec86999d", Pod:"calico-apiserver-54f5dc6b49-sst45", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8b13b1da469", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:33.440544 env[1194]: 2025-05-10 00:51:33.358 [INFO][4582] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" May 10 00:51:33.440544 env[1194]: 2025-05-10 00:51:33.358 [INFO][4582] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" iface="eth0" netns="" May 10 00:51:33.440544 env[1194]: 2025-05-10 00:51:33.358 [INFO][4582] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" May 10 00:51:33.440544 env[1194]: 2025-05-10 00:51:33.358 [INFO][4582] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" May 10 00:51:33.440544 env[1194]: 2025-05-10 00:51:33.414 [INFO][4589] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" HandleID="k8s-pod-network.8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0" May 10 00:51:33.440544 env[1194]: 2025-05-10 00:51:33.414 [INFO][4589] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:33.440544 env[1194]: 2025-05-10 00:51:33.414 [INFO][4589] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:33.440544 env[1194]: 2025-05-10 00:51:33.425 [WARNING][4589] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" HandleID="k8s-pod-network.8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0" May 10 00:51:33.440544 env[1194]: 2025-05-10 00:51:33.425 [INFO][4589] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" HandleID="k8s-pod-network.8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--apiserver--54f5dc6b49--sst45-eth0" May 10 00:51:33.440544 env[1194]: 2025-05-10 00:51:33.431 [INFO][4589] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:33.440544 env[1194]: 2025-05-10 00:51:33.436 [INFO][4582] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e" May 10 00:51:33.441549 env[1194]: time="2025-05-10T00:51:33.440853041Z" level=info msg="TearDown network for sandbox \"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\" successfully" May 10 00:51:33.450417 env[1194]: time="2025-05-10T00:51:33.450325711Z" level=info msg="RemovePodSandbox \"8eaa10c93859f375a6d2e1bb6e47aa1fce12b721339a41884c764209eda2a83e\" returns successfully" May 10 00:51:33.451326 env[1194]: time="2025-05-10T00:51:33.451279140Z" level=info msg="StopPodSandbox for \"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\"" May 10 00:51:33.481939 sshd[4444]: pam_unix(sshd:session): session closed for user core May 10 00:51:33.482000 audit[4444]: USER_END pid=4444 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:33.488896 kernel: audit: type=1106 audit(1746838293.482:1371): pid=4444 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:33.491056 systemd[1]: sshd@7-146.190.154.235:22-139.178.68.195:51744.service: Deactivated successfully. May 10 00:51:33.492312 systemd[1]: session-8.scope: Deactivated successfully. May 10 00:51:33.482000 audit[4444]: CRED_DISP pid=4444 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:33.499727 kernel: audit: type=1104 audit(1746838293.482:1372): pid=4444 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:33.499713 systemd-logind[1179]: Session 8 logged out. Waiting for processes to exit. May 10 00:51:33.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-146.190.154.235:22-139.178.68.195:51744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:33.501018 systemd-logind[1179]: Removed session 8. May 10 00:51:33.592673 env[1194]: 2025-05-10 00:51:33.540 [WARNING][4609] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0", GenerateName:"calico-kube-controllers-9d5ccc654-", Namespace:"calico-system", SelfLink:"", UID:"505cbb42-c217-49c3-a63b-83b244af8ef9", ResourceVersion:"929", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"9d5ccc654", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668", Pod:"calico-kube-controllers-9d5ccc654-s8r27", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali92b8f3f01b2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:33.592673 env[1194]: 2025-05-10 00:51:33.541 [INFO][4609] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" May 10 00:51:33.592673 env[1194]: 2025-05-10 00:51:33.541 [INFO][4609] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" iface="eth0" netns="" May 10 00:51:33.592673 env[1194]: 2025-05-10 00:51:33.541 [INFO][4609] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" May 10 00:51:33.592673 env[1194]: 2025-05-10 00:51:33.541 [INFO][4609] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" May 10 00:51:33.592673 env[1194]: 2025-05-10 00:51:33.568 [INFO][4619] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" HandleID="k8s-pod-network.ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0" May 10 00:51:33.592673 env[1194]: 2025-05-10 00:51:33.568 [INFO][4619] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:33.592673 env[1194]: 2025-05-10 00:51:33.568 [INFO][4619] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:33.592673 env[1194]: 2025-05-10 00:51:33.578 [WARNING][4619] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" HandleID="k8s-pod-network.ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0" May 10 00:51:33.592673 env[1194]: 2025-05-10 00:51:33.578 [INFO][4619] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" HandleID="k8s-pod-network.ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0" May 10 00:51:33.592673 env[1194]: 2025-05-10 00:51:33.587 [INFO][4619] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:33.592673 env[1194]: 2025-05-10 00:51:33.590 [INFO][4609] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" May 10 00:51:33.593868 env[1194]: time="2025-05-10T00:51:33.593377105Z" level=info msg="TearDown network for sandbox \"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\" successfully" May 10 00:51:33.593868 env[1194]: time="2025-05-10T00:51:33.593427115Z" level=info msg="StopPodSandbox for \"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\" returns successfully" May 10 00:51:33.594466 env[1194]: time="2025-05-10T00:51:33.594379278Z" level=info msg="RemovePodSandbox for \"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\"" May 10 00:51:33.594466 env[1194]: time="2025-05-10T00:51:33.594442586Z" level=info msg="Forcibly stopping sandbox \"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\"" May 10 00:51:33.705875 env[1194]: 2025-05-10 00:51:33.654 [WARNING][4639] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0", GenerateName:"calico-kube-controllers-9d5ccc654-", Namespace:"calico-system", SelfLink:"", UID:"505cbb42-c217-49c3-a63b-83b244af8ef9", ResourceVersion:"929", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"9d5ccc654", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"871d1d7345788eff064445cc6529fc511f0cac999456459ad9b40e26af743668", Pod:"calico-kube-controllers-9d5ccc654-s8r27", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali92b8f3f01b2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:33.705875 env[1194]: 2025-05-10 00:51:33.654 [INFO][4639] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" May 10 00:51:33.705875 env[1194]: 2025-05-10 00:51:33.654 [INFO][4639] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" iface="eth0" netns="" May 10 00:51:33.705875 env[1194]: 2025-05-10 00:51:33.654 [INFO][4639] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" May 10 00:51:33.705875 env[1194]: 2025-05-10 00:51:33.654 [INFO][4639] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" May 10 00:51:33.705875 env[1194]: 2025-05-10 00:51:33.687 [INFO][4647] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" HandleID="k8s-pod-network.ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0" May 10 00:51:33.705875 env[1194]: 2025-05-10 00:51:33.688 [INFO][4647] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:33.705875 env[1194]: 2025-05-10 00:51:33.688 [INFO][4647] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:33.705875 env[1194]: 2025-05-10 00:51:33.697 [WARNING][4647] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" HandleID="k8s-pod-network.ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0" May 10 00:51:33.705875 env[1194]: 2025-05-10 00:51:33.697 [INFO][4647] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" HandleID="k8s-pod-network.ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" Workload="ci--3510.3.7--n--09020fac35-k8s-calico--kube--controllers--9d5ccc654--s8r27-eth0" May 10 00:51:33.705875 env[1194]: 2025-05-10 00:51:33.700 [INFO][4647] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:33.705875 env[1194]: 2025-05-10 00:51:33.703 [INFO][4639] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb" May 10 00:51:33.706796 env[1194]: time="2025-05-10T00:51:33.706717383Z" level=info msg="TearDown network for sandbox \"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\" successfully" May 10 00:51:33.709815 env[1194]: time="2025-05-10T00:51:33.709752563Z" level=info msg="RemovePodSandbox \"ed93fac255720206fc64f614bd5f8b7b5fc8e3451cf2ae725661527ee84b48cb\" returns successfully" May 10 00:51:33.710484 env[1194]: time="2025-05-10T00:51:33.710452616Z" level=info msg="StopPodSandbox for \"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\"" May 10 00:51:33.841588 env[1194]: 2025-05-10 00:51:33.774 [WARNING][4665] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"afb76990-e60f-4e5f-9a6c-3c9209337ad5", ResourceVersion:"942", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c", Pod:"csi-node-driver-h5n6j", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.64.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali14c4b2d7bd2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:33.841588 env[1194]: 2025-05-10 00:51:33.775 [INFO][4665] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" May 10 00:51:33.841588 env[1194]: 2025-05-10 00:51:33.775 [INFO][4665] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" iface="eth0" netns="" May 10 00:51:33.841588 env[1194]: 2025-05-10 00:51:33.775 [INFO][4665] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" May 10 00:51:33.841588 env[1194]: 2025-05-10 00:51:33.775 [INFO][4665] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" May 10 00:51:33.841588 env[1194]: 2025-05-10 00:51:33.820 [INFO][4673] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" HandleID="k8s-pod-network.bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" Workload="ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0" May 10 00:51:33.841588 env[1194]: 2025-05-10 00:51:33.821 [INFO][4673] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:33.841588 env[1194]: 2025-05-10 00:51:33.821 [INFO][4673] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:33.841588 env[1194]: 2025-05-10 00:51:33.832 [WARNING][4673] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" HandleID="k8s-pod-network.bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" Workload="ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0" May 10 00:51:33.841588 env[1194]: 2025-05-10 00:51:33.832 [INFO][4673] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" HandleID="k8s-pod-network.bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" Workload="ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0" May 10 00:51:33.841588 env[1194]: 2025-05-10 00:51:33.835 [INFO][4673] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:33.841588 env[1194]: 2025-05-10 00:51:33.837 [INFO][4665] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" May 10 00:51:33.842589 env[1194]: time="2025-05-10T00:51:33.842532998Z" level=info msg="TearDown network for sandbox \"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\" successfully" May 10 00:51:33.842806 env[1194]: time="2025-05-10T00:51:33.842766547Z" level=info msg="StopPodSandbox for \"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\" returns successfully" May 10 00:51:33.846326 env[1194]: time="2025-05-10T00:51:33.846244507Z" level=info msg="RemovePodSandbox for \"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\"" May 10 00:51:33.846559 env[1194]: time="2025-05-10T00:51:33.846331712Z" level=info msg="Forcibly stopping sandbox \"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\"" May 10 00:51:34.001571 env[1194]: 2025-05-10 00:51:33.935 [WARNING][4692] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"afb76990-e60f-4e5f-9a6c-3c9209337ad5", ResourceVersion:"942", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-09020fac35", ContainerID:"2ce4898a8dc2c9169b67e05300841d5f6f378c07c87665fa5bdb07dbfd33489c", Pod:"csi-node-driver-h5n6j", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.64.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali14c4b2d7bd2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:34.001571 env[1194]: 2025-05-10 00:51:33.936 [INFO][4692] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" May 10 00:51:34.001571 env[1194]: 2025-05-10 00:51:33.936 [INFO][4692] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" iface="eth0" netns="" May 10 00:51:34.001571 env[1194]: 2025-05-10 00:51:33.936 [INFO][4692] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" May 10 00:51:34.001571 env[1194]: 2025-05-10 00:51:33.936 [INFO][4692] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" May 10 00:51:34.001571 env[1194]: 2025-05-10 00:51:33.982 [INFO][4700] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" HandleID="k8s-pod-network.bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" Workload="ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0" May 10 00:51:34.001571 env[1194]: 2025-05-10 00:51:33.983 [INFO][4700] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:34.001571 env[1194]: 2025-05-10 00:51:33.983 [INFO][4700] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:34.001571 env[1194]: 2025-05-10 00:51:33.992 [WARNING][4700] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" HandleID="k8s-pod-network.bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" Workload="ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0" May 10 00:51:34.001571 env[1194]: 2025-05-10 00:51:33.992 [INFO][4700] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" HandleID="k8s-pod-network.bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" Workload="ci--3510.3.7--n--09020fac35-k8s-csi--node--driver--h5n6j-eth0" May 10 00:51:34.001571 env[1194]: 2025-05-10 00:51:33.995 [INFO][4700] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:34.001571 env[1194]: 2025-05-10 00:51:33.998 [INFO][4692] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620" May 10 00:51:34.003179 env[1194]: time="2025-05-10T00:51:34.001608756Z" level=info msg="TearDown network for sandbox \"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\" successfully" May 10 00:51:34.006563 env[1194]: time="2025-05-10T00:51:34.006478918Z" level=info msg="RemovePodSandbox \"bd6867ea16815767f5ee31ebfdfd10682864dc62ebb2fc20d88758625a51a620\" returns successfully" May 10 00:51:34.291000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:34.291000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002a18540 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:51:34.291000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:51:34.293000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:34.293000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002a18560 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:51:34.293000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:51:34.293000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:34.293000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002a18580 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:51:34.293000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:51:34.295000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:34.295000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00279b000 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:51:34.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:51:36.172386 systemd[1]: run-containerd-runc-k8s.io-a1ec68e4e2db8f9c2048ca8fa5e50c73ab57646ca577d2c4863c23d5264cd500-runc.cQzN4B.mount: Deactivated successfully. May 10 00:51:36.289727 kubelet[1925]: E0510 00:51:36.289606 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:51:38.488583 systemd[1]: Started sshd@8-146.190.154.235:22-139.178.68.195:57852.service. May 10 00:51:38.491733 kernel: kauditd_printk_skb: 13 callbacks suppressed May 10 00:51:38.491845 kernel: audit: type=1130 audit(1746838298.488:1378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-146.190.154.235:22-139.178.68.195:57852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:38.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-146.190.154.235:22-139.178.68.195:57852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:38.558000 audit[4735]: USER_ACCT pid=4735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:38.559151 sshd[4735]: Accepted publickey for core from 139.178.68.195 port 57852 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:51:38.562672 kernel: audit: type=1101 audit(1746838298.558:1379): pid=4735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:38.563000 audit[4735]: CRED_ACQ pid=4735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:38.569274 kernel: audit: type=1103 audit(1746838298.563:1380): pid=4735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:38.569544 kernel: audit: type=1006 audit(1746838298.563:1381): pid=4735 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 10 00:51:38.569584 kernel: audit: type=1300 audit(1746838298.563:1381): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7a251490 a2=3 a3=0 items=0 ppid=1 pid=4735 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:38.563000 audit[4735]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7a251490 a2=3 a3=0 items=0 ppid=1 pid=4735 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:38.570082 sshd[4735]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:38.572588 kernel: audit: type=1327 audit(1746838298.563:1381): proctitle=737368643A20636F7265205B707269765D May 10 00:51:38.563000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:38.579403 systemd[1]: Started session-9.scope. May 10 00:51:38.581003 systemd-logind[1179]: New session 9 of user core. May 10 00:51:38.587000 audit[4735]: USER_START pid=4735 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:38.591694 kernel: audit: type=1105 audit(1746838298.587:1382): pid=4735 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:38.591000 audit[4737]: CRED_ACQ pid=4737 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:38.595728 kernel: audit: type=1103 audit(1746838298.591:1383): pid=4737 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:38.826437 sshd[4735]: pam_unix(sshd:session): session closed for user core May 10 00:51:38.828000 audit[4735]: USER_END pid=4735 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:38.830000 audit[4735]: CRED_DISP pid=4735 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:38.833296 systemd[1]: sshd@8-146.190.154.235:22-139.178.68.195:57852.service: Deactivated successfully. May 10 00:51:38.834984 kernel: audit: type=1106 audit(1746838298.828:1384): pid=4735 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:38.835053 kernel: audit: type=1104 audit(1746838298.830:1385): pid=4735 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:38.834211 systemd[1]: session-9.scope: Deactivated successfully. May 10 00:51:38.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-146.190.154.235:22-139.178.68.195:57852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:38.835915 systemd-logind[1179]: Session 9 logged out. Waiting for processes to exit. May 10 00:51:38.837063 systemd-logind[1179]: Removed session 9. May 10 00:51:43.833911 systemd[1]: Started sshd@9-146.190.154.235:22-139.178.68.195:57864.service. May 10 00:51:43.839522 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:51:43.839753 kernel: audit: type=1130 audit(1746838303.834:1387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-146.190.154.235:22-139.178.68.195:57864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:43.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-146.190.154.235:22-139.178.68.195:57864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:43.939000 audit[4750]: USER_ACCT pid=4750 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:43.945316 sshd[4750]: Accepted publickey for core from 139.178.68.195 port 57864 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:51:43.944000 audit[4750]: CRED_ACQ pid=4750 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:43.949462 kernel: audit: type=1101 audit(1746838303.939:1388): pid=4750 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:43.949692 kernel: audit: type=1103 audit(1746838303.944:1389): pid=4750 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:43.949728 kernel: audit: type=1006 audit(1746838303.944:1390): pid=4750 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 10 00:51:43.944000 audit[4750]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2a5c5960 a2=3 a3=0 items=0 ppid=1 pid=4750 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:43.956788 kernel: audit: type=1300 audit(1746838303.944:1390): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2a5c5960 a2=3 a3=0 items=0 ppid=1 pid=4750 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:43.944000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:43.958635 kernel: audit: type=1327 audit(1746838303.944:1390): proctitle=737368643A20636F7265205B707269765D May 10 00:51:43.959012 sshd[4750]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:43.966296 systemd-logind[1179]: New session 10 of user core. May 10 00:51:43.967796 systemd[1]: Started session-10.scope. May 10 00:51:43.973000 audit[4750]: USER_START pid=4750 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:43.978717 kernel: audit: type=1105 audit(1746838303.973:1391): pid=4750 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:43.979000 audit[4752]: CRED_ACQ pid=4752 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:43.984688 kernel: audit: type=1103 audit(1746838303.979:1392): pid=4752 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:44.209955 sshd[4750]: pam_unix(sshd:session): session closed for user core May 10 00:51:44.211000 audit[4750]: USER_END pid=4750 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:44.216286 systemd[1]: sshd@9-146.190.154.235:22-139.178.68.195:57864.service: Deactivated successfully. May 10 00:51:44.216679 kernel: audit: type=1106 audit(1746838304.211:1393): pid=4750 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:44.217255 systemd[1]: session-10.scope: Deactivated successfully. May 10 00:51:44.212000 audit[4750]: CRED_DISP pid=4750 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:44.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-146.190.154.235:22-139.178.68.195:57864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:44.221877 kernel: audit: type=1104 audit(1746838304.212:1394): pid=4750 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:44.221410 systemd-logind[1179]: Session 10 logged out. Waiting for processes to exit. May 10 00:51:44.223241 systemd-logind[1179]: Removed session 10. May 10 00:51:49.217587 systemd[1]: Started sshd@10-146.190.154.235:22-139.178.68.195:52732.service. May 10 00:51:49.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-146.190.154.235:22-139.178.68.195:52732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:49.219780 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:51:49.219883 kernel: audit: type=1130 audit(1746838309.217:1396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-146.190.154.235:22-139.178.68.195:52732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:49.287000 audit[4768]: USER_ACCT pid=4768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:49.301690 kernel: audit: type=1101 audit(1746838309.287:1397): pid=4768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:49.301783 sshd[4768]: Accepted publickey for core from 139.178.68.195 port 52732 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:51:49.301000 audit[4768]: CRED_ACQ pid=4768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:49.305803 kernel: audit: type=1103 audit(1746838309.301:1398): pid=4768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:49.306171 sshd[4768]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:49.301000 audit[4768]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb95dc9c0 a2=3 a3=0 items=0 ppid=1 pid=4768 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:49.312214 kernel: audit: type=1006 audit(1746838309.301:1399): pid=4768 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 10 00:51:49.312456 kernel: audit: type=1300 audit(1746838309.301:1399): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb95dc9c0 a2=3 a3=0 items=0 ppid=1 pid=4768 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:49.301000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:49.314808 kernel: audit: type=1327 audit(1746838309.301:1399): proctitle=737368643A20636F7265205B707269765D May 10 00:51:49.318832 systemd-logind[1179]: New session 11 of user core. May 10 00:51:49.319434 systemd[1]: Started session-11.scope. May 10 00:51:49.327000 audit[4768]: USER_START pid=4768 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:49.331670 kernel: audit: type=1105 audit(1746838309.327:1400): pid=4768 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:49.335266 kernel: audit: type=1103 audit(1746838309.330:1401): pid=4770 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:49.330000 audit[4770]: CRED_ACQ pid=4770 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:49.527081 sshd[4768]: pam_unix(sshd:session): session closed for user core May 10 00:51:49.528000 audit[4768]: USER_END pid=4768 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:49.533674 kernel: audit: type=1106 audit(1746838309.528:1402): pid=4768 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:49.534000 audit[4768]: CRED_DISP pid=4768 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:49.539654 kernel: audit: type=1104 audit(1746838309.534:1403): pid=4768 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:49.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-146.190.154.235:22-139.178.68.195:52744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:49.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-146.190.154.235:22-139.178.68.195:52732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:49.541212 systemd[1]: Started sshd@11-146.190.154.235:22-139.178.68.195:52744.service. May 10 00:51:49.542149 systemd[1]: sshd@10-146.190.154.235:22-139.178.68.195:52732.service: Deactivated successfully. May 10 00:51:49.546063 systemd[1]: session-11.scope: Deactivated successfully. May 10 00:51:49.548901 systemd-logind[1179]: Session 11 logged out. Waiting for processes to exit. May 10 00:51:49.550557 systemd-logind[1179]: Removed session 11. May 10 00:51:49.591000 audit[4780]: USER_ACCT pid=4780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:49.592800 sshd[4780]: Accepted publickey for core from 139.178.68.195 port 52744 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:51:49.593000 audit[4780]: CRED_ACQ pid=4780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:49.594000 audit[4780]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9078a5c0 a2=3 a3=0 items=0 ppid=1 pid=4780 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:49.594000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:49.596068 sshd[4780]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:49.603305 systemd[1]: Started session-12.scope. May 10 00:51:49.603823 systemd-logind[1179]: New session 12 of user core. May 10 00:51:49.611000 audit[4780]: USER_START pid=4780 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:49.613000 audit[4783]: CRED_ACQ pid=4783 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:49.988491 sshd[4780]: pam_unix(sshd:session): session closed for user core May 10 00:51:49.991000 audit[4780]: USER_END pid=4780 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:49.991000 audit[4780]: CRED_DISP pid=4780 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:49.995716 systemd[1]: sshd@11-146.190.154.235:22-139.178.68.195:52744.service: Deactivated successfully. May 10 00:51:49.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-146.190.154.235:22-139.178.68.195:52744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:49.996823 systemd[1]: session-12.scope: Deactivated successfully. May 10 00:51:49.998078 systemd-logind[1179]: Session 12 logged out. Waiting for processes to exit. May 10 00:51:50.004144 systemd[1]: Started sshd@12-146.190.154.235:22-139.178.68.195:52758.service. May 10 00:51:50.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-146.190.154.235:22-139.178.68.195:52758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:50.013543 systemd-logind[1179]: Removed session 12. May 10 00:51:50.077316 sshd[4790]: Accepted publickey for core from 139.178.68.195 port 52758 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:51:50.076000 audit[4790]: USER_ACCT pid=4790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:50.080184 sshd[4790]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:50.079000 audit[4790]: CRED_ACQ pid=4790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:50.079000 audit[4790]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca6e069a0 a2=3 a3=0 items=0 ppid=1 pid=4790 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:50.079000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:50.088896 systemd[1]: Started session-13.scope. May 10 00:51:50.089309 systemd-logind[1179]: New session 13 of user core. May 10 00:51:50.098000 audit[4790]: USER_START pid=4790 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:50.102000 audit[4792]: CRED_ACQ pid=4792 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:50.361090 sshd[4790]: pam_unix(sshd:session): session closed for user core May 10 00:51:50.363000 audit[4790]: USER_END pid=4790 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:50.363000 audit[4790]: CRED_DISP pid=4790 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:50.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-146.190.154.235:22-139.178.68.195:52758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:50.366708 systemd[1]: sshd@12-146.190.154.235:22-139.178.68.195:52758.service: Deactivated successfully. May 10 00:51:50.367601 systemd[1]: session-13.scope: Deactivated successfully. May 10 00:51:50.368041 systemd-logind[1179]: Session 13 logged out. Waiting for processes to exit. May 10 00:51:50.370022 systemd-logind[1179]: Removed session 13. May 10 00:51:53.940049 kubelet[1925]: E0510 00:51:53.939998 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:51:55.368560 systemd[1]: Started sshd@13-146.190.154.235:22-139.178.68.195:50070.service. May 10 00:51:55.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-146.190.154.235:22-139.178.68.195:50070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:55.373504 kernel: kauditd_printk_skb: 23 callbacks suppressed May 10 00:51:55.373790 kernel: audit: type=1130 audit(1746838315.368:1423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-146.190.154.235:22-139.178.68.195:50070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:55.429000 audit[4824]: USER_ACCT pid=4824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:55.431807 sshd[4824]: Accepted publickey for core from 139.178.68.195 port 50070 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:51:55.434656 kernel: audit: type=1101 audit(1746838315.429:1424): pid=4824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:55.434000 audit[4824]: CRED_ACQ pid=4824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:55.440509 kernel: audit: type=1103 audit(1746838315.434:1425): pid=4824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:55.440738 kernel: audit: type=1006 audit(1746838315.434:1426): pid=4824 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 10 00:51:55.440775 kernel: audit: type=1300 audit(1746838315.434:1426): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9b39c670 a2=3 a3=0 items=0 ppid=1 pid=4824 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:55.434000 audit[4824]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9b39c670 a2=3 a3=0 items=0 ppid=1 pid=4824 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:55.441393 sshd[4824]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:55.434000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:55.445777 kernel: audit: type=1327 audit(1746838315.434:1426): proctitle=737368643A20636F7265205B707269765D May 10 00:51:55.451459 systemd[1]: Started session-14.scope. May 10 00:51:55.452255 systemd-logind[1179]: New session 14 of user core. May 10 00:51:55.457000 audit[4824]: USER_START pid=4824 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:55.465114 kernel: audit: type=1105 audit(1746838315.457:1427): pid=4824 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:55.465224 kernel: audit: type=1103 audit(1746838315.461:1428): pid=4826 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:55.461000 audit[4826]: CRED_ACQ pid=4826 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:55.622295 sshd[4824]: pam_unix(sshd:session): session closed for user core May 10 00:51:55.623000 audit[4824]: USER_END pid=4824 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:55.626000 audit[4824]: CRED_DISP pid=4824 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:55.630839 kernel: audit: type=1106 audit(1746838315.623:1429): pid=4824 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:55.631086 kernel: audit: type=1104 audit(1746838315.626:1430): pid=4824 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:55.631386 systemd[1]: sshd@13-146.190.154.235:22-139.178.68.195:50070.service: Deactivated successfully. May 10 00:51:55.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-146.190.154.235:22-139.178.68.195:50070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:55.632888 systemd[1]: session-14.scope: Deactivated successfully. May 10 00:51:55.633860 systemd-logind[1179]: Session 14 logged out. Waiting for processes to exit. May 10 00:51:55.635712 systemd-logind[1179]: Removed session 14. May 10 00:52:00.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-146.190.154.235:22-139.178.68.195:50076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:00.631173 systemd[1]: Started sshd@14-146.190.154.235:22-139.178.68.195:50076.service. May 10 00:52:00.632342 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:52:00.632412 kernel: audit: type=1130 audit(1746838320.629:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-146.190.154.235:22-139.178.68.195:50076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:00.689000 audit[4840]: USER_ACCT pid=4840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:00.691272 sshd[4840]: Accepted publickey for core from 139.178.68.195 port 50076 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:52:00.694670 kernel: audit: type=1101 audit(1746838320.689:1433): pid=4840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:00.695000 audit[4840]: CRED_ACQ pid=4840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:00.698003 sshd[4840]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:52:00.701969 kernel: audit: type=1103 audit(1746838320.695:1434): pid=4840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:00.702113 kernel: audit: type=1006 audit(1746838320.695:1435): pid=4840 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 10 00:52:00.695000 audit[4840]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb4b8fd50 a2=3 a3=0 items=0 ppid=1 pid=4840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:00.705478 kernel: audit: type=1300 audit(1746838320.695:1435): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb4b8fd50 a2=3 a3=0 items=0 ppid=1 pid=4840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:00.705758 kernel: audit: type=1327 audit(1746838320.695:1435): proctitle=737368643A20636F7265205B707269765D May 10 00:52:00.695000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:52:00.711045 systemd-logind[1179]: New session 15 of user core. May 10 00:52:00.711669 systemd[1]: Started session-15.scope. May 10 00:52:00.716000 audit[4840]: USER_START pid=4840 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:00.718000 audit[4842]: CRED_ACQ pid=4842 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:00.725068 kernel: audit: type=1105 audit(1746838320.716:1436): pid=4840 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:00.725207 kernel: audit: type=1103 audit(1746838320.718:1437): pid=4842 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:00.898193 sshd[4840]: pam_unix(sshd:session): session closed for user core May 10 00:52:00.898000 audit[4840]: USER_END pid=4840 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:00.906722 kernel: audit: type=1106 audit(1746838320.898:1438): pid=4840 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:00.906849 kernel: audit: type=1104 audit(1746838320.899:1439): pid=4840 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:00.899000 audit[4840]: CRED_DISP pid=4840 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:00.904928 systemd[1]: sshd@14-146.190.154.235:22-139.178.68.195:50076.service: Deactivated successfully. May 10 00:52:00.905997 systemd[1]: session-15.scope: Deactivated successfully. May 10 00:52:00.911611 systemd-logind[1179]: Session 15 logged out. Waiting for processes to exit. May 10 00:52:00.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-146.190.154.235:22-139.178.68.195:50076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:00.914314 systemd-logind[1179]: Removed session 15. May 10 00:52:00.921240 kubelet[1925]: E0510 00:52:00.920574 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:52:00.921240 kubelet[1925]: E0510 00:52:00.920840 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:52:05.905837 systemd[1]: Started sshd@15-146.190.154.235:22-139.178.68.195:58286.service. May 10 00:52:05.909707 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:52:05.909835 kernel: audit: type=1130 audit(1746838325.904:1441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-146.190.154.235:22-139.178.68.195:58286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:05.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-146.190.154.235:22-139.178.68.195:58286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:05.958000 audit[4852]: USER_ACCT pid=4852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:05.960008 sshd[4852]: Accepted publickey for core from 139.178.68.195 port 58286 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:52:05.961000 audit[4852]: CRED_ACQ pid=4852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:05.966448 kernel: audit: type=1101 audit(1746838325.958:1442): pid=4852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:05.966526 kernel: audit: type=1103 audit(1746838325.961:1443): pid=4852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:05.966547 kernel: audit: type=1006 audit(1746838325.964:1444): pid=4852 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 10 00:52:05.966708 sshd[4852]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:52:05.968604 kernel: audit: type=1300 audit(1746838325.964:1444): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5c559370 a2=3 a3=0 items=0 ppid=1 pid=4852 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:05.964000 audit[4852]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5c559370 a2=3 a3=0 items=0 ppid=1 pid=4852 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:05.964000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:52:05.973660 kernel: audit: type=1327 audit(1746838325.964:1444): proctitle=737368643A20636F7265205B707269765D May 10 00:52:05.978378 systemd-logind[1179]: New session 16 of user core. May 10 00:52:05.978454 systemd[1]: Started session-16.scope. May 10 00:52:05.983000 audit[4852]: USER_START pid=4852 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:05.986000 audit[4854]: CRED_ACQ pid=4854 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:05.992236 kernel: audit: type=1105 audit(1746838325.983:1445): pid=4852 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:05.992878 kernel: audit: type=1103 audit(1746838325.986:1446): pid=4854 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:06.170406 sshd[4852]: pam_unix(sshd:session): session closed for user core May 10 00:52:06.180000 audit[4852]: USER_END pid=4852 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:06.180000 audit[4852]: CRED_DISP pid=4852 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:06.185704 systemd[1]: sshd@15-146.190.154.235:22-139.178.68.195:58286.service: Deactivated successfully. May 10 00:52:06.194423 kernel: audit: type=1106 audit(1746838326.180:1447): pid=4852 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:06.195516 kernel: audit: type=1104 audit(1746838326.180:1448): pid=4852 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:06.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-146.190.154.235:22-139.178.68.195:58286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:06.186802 systemd[1]: session-16.scope: Deactivated successfully. May 10 00:52:06.189845 systemd-logind[1179]: Session 16 logged out. Waiting for processes to exit. May 10 00:52:06.191116 systemd-logind[1179]: Removed session 16. May 10 00:52:08.923474 kubelet[1925]: E0510 00:52:08.923403 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:52:11.173810 systemd[1]: Started sshd@16-146.190.154.235:22-139.178.68.195:58300.service. May 10 00:52:11.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-146.190.154.235:22-139.178.68.195:58300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:11.176111 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:52:11.176213 kernel: audit: type=1130 audit(1746838331.173:1450): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-146.190.154.235:22-139.178.68.195:58300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:11.243000 audit[4887]: USER_ACCT pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:11.246060 sshd[4887]: Accepted publickey for core from 139.178.68.195 port 58300 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:52:11.249725 kernel: audit: type=1101 audit(1746838331.243:1451): pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:11.248000 audit[4887]: CRED_ACQ pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:11.255823 kernel: audit: type=1103 audit(1746838331.248:1452): pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:11.256092 kernel: audit: type=1006 audit(1746838331.249:1453): pid=4887 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 10 00:52:11.256139 kernel: audit: type=1300 audit(1746838331.249:1453): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbb7c10c0 a2=3 a3=0 items=0 ppid=1 pid=4887 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:11.249000 audit[4887]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbb7c10c0 a2=3 a3=0 items=0 ppid=1 pid=4887 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:11.256770 sshd[4887]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:52:11.249000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:52:11.260577 kernel: audit: type=1327 audit(1746838331.249:1453): proctitle=737368643A20636F7265205B707269765D May 10 00:52:11.264832 systemd[1]: Started session-17.scope. May 10 00:52:11.265352 systemd-logind[1179]: New session 17 of user core. May 10 00:52:11.269000 audit[4887]: USER_START pid=4887 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:11.271000 audit[4889]: CRED_ACQ pid=4889 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:11.287722 kernel: audit: type=1105 audit(1746838331.269:1454): pid=4887 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:11.287897 kernel: audit: type=1103 audit(1746838331.271:1455): pid=4889 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:11.450567 sshd[4887]: pam_unix(sshd:session): session closed for user core May 10 00:52:11.451000 audit[4887]: USER_END pid=4887 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:11.456886 kernel: audit: type=1106 audit(1746838331.451:1456): pid=4887 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:11.455390 systemd[1]: sshd@16-146.190.154.235:22-139.178.68.195:58300.service: Deactivated successfully. May 10 00:52:11.456363 systemd[1]: session-17.scope: Deactivated successfully. May 10 00:52:11.451000 audit[4887]: CRED_DISP pid=4887 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:11.461009 kernel: audit: type=1104 audit(1746838331.451:1457): pid=4887 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:11.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-146.190.154.235:22-139.178.68.195:58300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:11.462390 systemd-logind[1179]: Session 17 logged out. Waiting for processes to exit. May 10 00:52:11.463360 systemd-logind[1179]: Removed session 17. May 10 00:52:16.460193 systemd[1]: Started sshd@17-146.190.154.235:22-139.178.68.195:40128.service. May 10 00:52:16.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-146.190.154.235:22-139.178.68.195:40128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:16.462910 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:52:16.463009 kernel: audit: type=1130 audit(1746838336.460:1459): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-146.190.154.235:22-139.178.68.195:40128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:16.565000 audit[4901]: USER_ACCT pid=4901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:16.570230 sshd[4901]: Accepted publickey for core from 139.178.68.195 port 40128 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:52:16.574392 kernel: audit: type=1101 audit(1746838336.565:1460): pid=4901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:16.574575 kernel: audit: type=1103 audit(1746838336.569:1461): pid=4901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:16.574672 kernel: audit: type=1006 audit(1746838336.569:1462): pid=4901 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 10 00:52:16.569000 audit[4901]: CRED_ACQ pid=4901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:16.569000 audit[4901]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc80611070 a2=3 a3=0 items=0 ppid=1 pid=4901 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:16.577949 sshd[4901]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:52:16.581397 kernel: audit: type=1300 audit(1746838336.569:1462): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc80611070 a2=3 a3=0 items=0 ppid=1 pid=4901 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:16.581694 kernel: audit: type=1327 audit(1746838336.569:1462): proctitle=737368643A20636F7265205B707269765D May 10 00:52:16.569000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:52:16.590225 systemd[1]: Started session-18.scope. May 10 00:52:16.590885 systemd-logind[1179]: New session 18 of user core. May 10 00:52:16.597000 audit[4901]: USER_START pid=4901 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:16.603718 kernel: audit: type=1105 audit(1746838336.597:1463): pid=4901 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:16.604000 audit[4903]: CRED_ACQ pid=4903 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:16.609733 kernel: audit: type=1103 audit(1746838336.604:1464): pid=4903 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:16.876536 sshd[4901]: pam_unix(sshd:session): session closed for user core May 10 00:52:16.877000 audit[4901]: USER_END pid=4901 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:16.884902 kernel: audit: type=1106 audit(1746838336.877:1465): pid=4901 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:16.885130 kernel: audit: type=1104 audit(1746838336.878:1466): pid=4901 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:16.878000 audit[4901]: CRED_DISP pid=4901 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:16.889997 systemd[1]: Started sshd@18-146.190.154.235:22-139.178.68.195:40136.service. May 10 00:52:16.893673 systemd[1]: sshd@17-146.190.154.235:22-139.178.68.195:40128.service: Deactivated successfully. May 10 00:52:16.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-146.190.154.235:22-139.178.68.195:40136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:16.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-146.190.154.235:22-139.178.68.195:40128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:16.895247 systemd[1]: session-18.scope: Deactivated successfully. May 10 00:52:16.896246 systemd-logind[1179]: Session 18 logged out. Waiting for processes to exit. May 10 00:52:16.897534 systemd-logind[1179]: Removed session 18. May 10 00:52:16.950000 audit[4911]: USER_ACCT pid=4911 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:16.951219 sshd[4911]: Accepted publickey for core from 139.178.68.195 port 40136 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:52:16.952000 audit[4911]: CRED_ACQ pid=4911 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:16.952000 audit[4911]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc40e1e90 a2=3 a3=0 items=0 ppid=1 pid=4911 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:16.952000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:52:16.953398 sshd[4911]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:52:16.958584 systemd-logind[1179]: New session 19 of user core. May 10 00:52:16.959403 systemd[1]: Started session-19.scope. May 10 00:52:16.965000 audit[4911]: USER_START pid=4911 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:16.967000 audit[4914]: CRED_ACQ pid=4914 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:17.270000 audit[4131]: AVC avc: denied { watch } for pid=4131 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_50_56.1168680679/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c37 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c21,c37 tclass=file permissive=0 May 10 00:52:17.270000 audit[4131]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0024efe20 a2=fc6 a3=0 items=0 ppid=3761 pid=4131 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c37 key=(null) May 10 00:52:17.270000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:52:17.354910 sshd[4911]: pam_unix(sshd:session): session closed for user core May 10 00:52:17.357000 audit[4911]: USER_END pid=4911 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:17.357000 audit[4911]: CRED_DISP pid=4911 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:17.362846 systemd[1]: Started sshd@19-146.190.154.235:22-139.178.68.195:40146.service. May 10 00:52:17.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-146.190.154.235:22-139.178.68.195:40146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:17.367155 systemd[1]: sshd@18-146.190.154.235:22-139.178.68.195:40136.service: Deactivated successfully. May 10 00:52:17.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-146.190.154.235:22-139.178.68.195:40136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:17.372099 systemd[1]: session-19.scope: Deactivated successfully. May 10 00:52:17.374127 systemd-logind[1179]: Session 19 logged out. Waiting for processes to exit. May 10 00:52:17.375372 systemd-logind[1179]: Removed session 19. May 10 00:52:17.431000 audit[4921]: USER_ACCT pid=4921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:17.432174 sshd[4921]: Accepted publickey for core from 139.178.68.195 port 40146 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:52:17.433000 audit[4921]: CRED_ACQ pid=4921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:17.433000 audit[4921]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0a2a08c0 a2=3 a3=0 items=0 ppid=1 pid=4921 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:17.433000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:52:17.434488 sshd[4921]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:52:17.441432 systemd[1]: Started session-20.scope. May 10 00:52:17.442127 systemd-logind[1179]: New session 20 of user core. May 10 00:52:17.447000 audit[4921]: USER_START pid=4921 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:17.450000 audit[4924]: CRED_ACQ pid=4924 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:18.473000 audit[4934]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=4934 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:52:18.473000 audit[4934]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc39057a60 a2=0 a3=7ffc39057a4c items=0 ppid=2058 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:18.473000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:52:18.483000 audit[4934]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=4934 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:52:18.483000 audit[4934]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc39057a60 a2=0 a3=0 items=0 ppid=2058 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:18.483000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:52:18.499882 sshd[4921]: pam_unix(sshd:session): session closed for user core May 10 00:52:18.503000 audit[4921]: USER_END pid=4921 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:18.503000 audit[4921]: CRED_DISP pid=4921 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:18.508847 systemd[1]: sshd@19-146.190.154.235:22-139.178.68.195:40146.service: Deactivated successfully. May 10 00:52:18.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-146.190.154.235:22-139.178.68.195:40146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:18.510653 systemd[1]: session-20.scope: Deactivated successfully. May 10 00:52:18.510000 audit[4936]: NETFILTER_CFG table=filter:125 family=2 entries=32 op=nft_register_rule pid=4936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:52:18.510000 audit[4936]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe4bb40bc0 a2=0 a3=7ffe4bb40bac items=0 ppid=2058 pid=4936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:18.510000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:52:18.512138 systemd-logind[1179]: Session 20 logged out. Waiting for processes to exit. May 10 00:52:18.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-146.190.154.235:22-139.178.68.195:40150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:18.514400 systemd[1]: Started sshd@20-146.190.154.235:22-139.178.68.195:40150.service. May 10 00:52:18.516027 systemd-logind[1179]: Removed session 20. May 10 00:52:18.521000 audit[4936]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=4936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:52:18.521000 audit[4936]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe4bb40bc0 a2=0 a3=0 items=0 ppid=2058 pid=4936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:18.521000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:52:18.572915 sshd[4939]: Accepted publickey for core from 139.178.68.195 port 40150 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:52:18.572000 audit[4939]: USER_ACCT pid=4939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:18.573000 audit[4939]: CRED_ACQ pid=4939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:18.573000 audit[4939]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5fa58e20 a2=3 a3=0 items=0 ppid=1 pid=4939 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:18.573000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:52:18.575150 sshd[4939]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:52:18.582638 systemd[1]: Started session-21.scope. May 10 00:52:18.584603 systemd-logind[1179]: New session 21 of user core. May 10 00:52:18.590000 audit[4939]: USER_START pid=4939 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:18.594000 audit[4941]: CRED_ACQ pid=4941 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:19.029381 sshd[4939]: pam_unix(sshd:session): session closed for user core May 10 00:52:19.034000 audit[4939]: USER_END pid=4939 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:19.036000 audit[4939]: CRED_DISP pid=4939 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:19.041332 systemd[1]: Started sshd@21-146.190.154.235:22-139.178.68.195:40166.service. May 10 00:52:19.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-146.190.154.235:22-139.178.68.195:40166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:19.042766 systemd[1]: sshd@20-146.190.154.235:22-139.178.68.195:40150.service: Deactivated successfully. May 10 00:52:19.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-146.190.154.235:22-139.178.68.195:40150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:19.045150 systemd[1]: session-21.scope: Deactivated successfully. May 10 00:52:19.048295 systemd-logind[1179]: Session 21 logged out. Waiting for processes to exit. May 10 00:52:19.050077 systemd-logind[1179]: Removed session 21. May 10 00:52:19.112000 audit[4948]: USER_ACCT pid=4948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:19.113753 sshd[4948]: Accepted publickey for core from 139.178.68.195 port 40166 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:52:19.114000 audit[4948]: CRED_ACQ pid=4948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:19.115000 audit[4948]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca1d1c9f0 a2=3 a3=0 items=0 ppid=1 pid=4948 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:19.115000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:52:19.117161 sshd[4948]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:52:19.126285 systemd[1]: Started session-22.scope. May 10 00:52:19.126990 systemd-logind[1179]: New session 22 of user core. May 10 00:52:19.134000 audit[4948]: USER_START pid=4948 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:19.138000 audit[4951]: CRED_ACQ pid=4951 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:19.307345 sshd[4948]: pam_unix(sshd:session): session closed for user core May 10 00:52:19.308000 audit[4948]: USER_END pid=4948 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:19.309000 audit[4948]: CRED_DISP pid=4948 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:19.311866 systemd[1]: sshd@21-146.190.154.235:22-139.178.68.195:40166.service: Deactivated successfully. May 10 00:52:19.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-146.190.154.235:22-139.178.68.195:40166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:19.312815 systemd[1]: session-22.scope: Deactivated successfully. May 10 00:52:19.313700 systemd-logind[1179]: Session 22 logged out. Waiting for processes to exit. May 10 00:52:19.314707 systemd-logind[1179]: Removed session 22. May 10 00:52:20.282792 systemd[1]: run-containerd-runc-k8s.io-2ad40a3c1dae0077d8cfd7593ad639b53408ca5e23340fb24a3fe1187539d2ae-runc.YtWNtG.mount: Deactivated successfully. May 10 00:52:21.337000 audit[4257]: AVC avc: denied { watch } for pid=4257 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_50_56.2109011056/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c778,c913 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c778,c913 tclass=file permissive=0 May 10 00:52:21.337000 audit[4257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a38240 a2=fc6 a3=0 items=0 ppid=4079 pid=4257 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c778,c913 key=(null) May 10 00:52:21.337000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:52:24.316512 systemd[1]: Started sshd@22-146.190.154.235:22-139.178.68.195:40180.service. May 10 00:52:24.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-146.190.154.235:22-139.178.68.195:40180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:24.318457 kernel: kauditd_printk_skb: 63 callbacks suppressed May 10 00:52:24.318569 kernel: audit: type=1130 audit(1746838344.316:1510): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-146.190.154.235:22-139.178.68.195:40180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:24.386000 audit[4981]: USER_ACCT pid=4981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:24.387985 sshd[4981]: Accepted publickey for core from 139.178.68.195 port 40180 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:52:24.391673 kernel: audit: type=1101 audit(1746838344.386:1511): pid=4981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:24.391000 audit[4981]: CRED_ACQ pid=4981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:24.396943 kernel: audit: type=1103 audit(1746838344.391:1512): pid=4981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:24.393408 sshd[4981]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:52:24.392000 audit[4981]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdadd64ce0 a2=3 a3=0 items=0 ppid=1 pid=4981 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:24.404592 kernel: audit: type=1006 audit(1746838344.392:1513): pid=4981 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 10 00:52:24.405148 kernel: audit: type=1300 audit(1746838344.392:1513): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdadd64ce0 a2=3 a3=0 items=0 ppid=1 pid=4981 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:24.405274 kernel: audit: type=1327 audit(1746838344.392:1513): proctitle=737368643A20636F7265205B707269765D May 10 00:52:24.392000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:52:24.410232 systemd-logind[1179]: New session 23 of user core. May 10 00:52:24.411212 systemd[1]: Started session-23.scope. May 10 00:52:24.417000 audit[4981]: USER_START pid=4981 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:24.419000 audit[4983]: CRED_ACQ pid=4983 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:24.425577 kernel: audit: type=1105 audit(1746838344.417:1514): pid=4981 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:24.425787 kernel: audit: type=1103 audit(1746838344.419:1515): pid=4983 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:24.597933 sshd[4981]: pam_unix(sshd:session): session closed for user core May 10 00:52:24.600000 audit[4981]: USER_END pid=4981 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:24.604670 kernel: audit: type=1106 audit(1746838344.600:1516): pid=4981 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:24.604000 audit[4981]: CRED_DISP pid=4981 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:24.608668 kernel: audit: type=1104 audit(1746838344.604:1517): pid=4981 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:24.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-146.190.154.235:22-139.178.68.195:40180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:24.610013 systemd[1]: sshd@22-146.190.154.235:22-139.178.68.195:40180.service: Deactivated successfully. May 10 00:52:24.610992 systemd[1]: session-23.scope: Deactivated successfully. May 10 00:52:24.611451 systemd-logind[1179]: Session 23 logged out. Waiting for processes to exit. May 10 00:52:24.613232 systemd-logind[1179]: Removed session 23. May 10 00:52:24.942771 kubelet[1925]: E0510 00:52:24.942639 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:52:26.955000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:26.955000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00208b5c0 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:52:26.955000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:52:26.955000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:26.955000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002163f50 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:52:26.955000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:52:27.289000 audit[4993]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=4993 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:52:27.289000 audit[4993]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd149a5420 a2=0 a3=7ffd149a540c items=0 ppid=2058 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:27.289000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:52:27.297000 audit[4993]: NETFILTER_CFG table=nat:128 family=2 entries=106 op=nft_register_chain pid=4993 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:52:27.297000 audit[4993]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd149a5420 a2=0 a3=7ffd149a540c items=0 ppid=2058 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:27.297000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:52:27.678000 audit[1784]: AVC avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:27.678000 audit[1784]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c007df1530 a2=fc6 a3=0 items=0 ppid=1626 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 key=(null) May 10 00:52:27.678000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 10 00:52:27.686000 audit[1784]: AVC avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:27.686000 audit[1784]: AVC avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:27.686000 audit[1784]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c007df1590 a2=fc6 a3=0 items=0 ppid=1626 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 key=(null) May 10 00:52:27.686000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 10 00:52:27.686000 audit[1784]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00d26aa20 a2=fc6 a3=0 items=0 ppid=1626 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 key=(null) May 10 00:52:27.686000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 10 00:52:27.710000 audit[1784]: AVC avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:27.710000 audit[1784]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00a49ebd0 a2=fc6 a3=0 items=0 ppid=1626 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 key=(null) May 10 00:52:27.710000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 10 00:52:27.755000 audit[1784]: AVC avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:27.755000 audit[1784]: AVC avc: denied { watch } for pid=1784 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:27.755000 audit[1784]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c007df17a0 a2=fc6 a3=0 items=0 ppid=1626 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 key=(null) May 10 00:52:27.755000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 10 00:52:27.755000 audit[1784]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00d26aa40 a2=fc6 a3=0 items=0 ppid=1626 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c561 key=(null) May 10 00:52:27.755000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F May 10 00:52:27.927541 kubelet[1925]: E0510 00:52:27.927492 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:52:29.609692 systemd[1]: Started sshd@23-146.190.154.235:22-139.178.68.195:50560.service. May 10 00:52:29.615281 kernel: kauditd_printk_skb: 31 callbacks suppressed May 10 00:52:29.615395 kernel: audit: type=1130 audit(1746838349.609:1529): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-146.190.154.235:22-139.178.68.195:50560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:29.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-146.190.154.235:22-139.178.68.195:50560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:29.672000 audit[5017]: USER_ACCT pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:29.677184 sshd[5017]: Accepted publickey for core from 139.178.68.195 port 50560 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:52:29.678094 kernel: audit: type=1101 audit(1746838349.672:1530): pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:29.677000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:29.678899 sshd[5017]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:52:29.684164 kernel: audit: type=1103 audit(1746838349.677:1531): pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:29.684275 kernel: audit: type=1006 audit(1746838349.677:1532): pid=5017 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 10 00:52:29.684307 kernel: audit: type=1300 audit(1746838349.677:1532): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb30258d0 a2=3 a3=0 items=0 ppid=1 pid=5017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:29.677000 audit[5017]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb30258d0 a2=3 a3=0 items=0 ppid=1 pid=5017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:29.687484 kernel: audit: type=1327 audit(1746838349.677:1532): proctitle=737368643A20636F7265205B707269765D May 10 00:52:29.677000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:52:29.690539 systemd-logind[1179]: New session 24 of user core. May 10 00:52:29.690636 systemd[1]: Started session-24.scope. May 10 00:52:29.702962 kernel: audit: type=1105 audit(1746838349.697:1533): pid=5017 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:29.697000 audit[5017]: USER_START pid=5017 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:29.702000 audit[5022]: CRED_ACQ pid=5022 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:29.706681 kernel: audit: type=1103 audit(1746838349.702:1534): pid=5022 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:29.870573 sshd[5017]: pam_unix(sshd:session): session closed for user core May 10 00:52:29.874000 audit[5017]: USER_END pid=5017 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:29.879877 kernel: audit: type=1106 audit(1746838349.874:1535): pid=5017 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:29.876000 audit[5017]: CRED_DISP pid=5017 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:29.883750 kernel: audit: type=1104 audit(1746838349.876:1536): pid=5017 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:29.884089 systemd[1]: sshd@23-146.190.154.235:22-139.178.68.195:50560.service: Deactivated successfully. May 10 00:52:29.885049 systemd[1]: session-24.scope: Deactivated successfully. May 10 00:52:29.886487 systemd-logind[1179]: Session 24 logged out. Waiting for processes to exit. May 10 00:52:29.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-146.190.154.235:22-139.178.68.195:50560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:29.888590 systemd-logind[1179]: Removed session 24. May 10 00:52:33.921391 kubelet[1925]: E0510 00:52:33.921343 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:52:34.294000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:34.294000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:34.294000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00279b9c0 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:52:34.294000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:52:34.294000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026fb080 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:52:34.294000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:52:34.298000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:34.298000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0026fb3a0 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:52:34.298000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:52:34.298000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:34.298000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0026fb3c0 a2=fc6 a3=0 items=0 ppid=1647 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c865,c994 key=(null) May 10 00:52:34.298000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:52:34.879930 systemd[1]: Started sshd@24-146.190.154.235:22-139.178.68.195:50564.service. May 10 00:52:34.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-146.190.154.235:22-139.178.68.195:50564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:34.884521 kernel: kauditd_printk_skb: 13 callbacks suppressed May 10 00:52:34.884683 kernel: audit: type=1130 audit(1746838354.880:1542): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-146.190.154.235:22-139.178.68.195:50564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:34.963889 sshd[5035]: Accepted publickey for core from 139.178.68.195 port 50564 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:52:34.963000 audit[5035]: USER_ACCT pid=5035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:34.968738 kernel: audit: type=1101 audit(1746838354.963:1543): pid=5035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:34.967000 audit[5035]: CRED_ACQ pid=5035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:34.974089 kernel: audit: type=1103 audit(1746838354.967:1544): pid=5035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:34.974279 kernel: audit: type=1006 audit(1746838354.968:1545): pid=5035 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 10 00:52:34.974322 kernel: audit: type=1300 audit(1746838354.968:1545): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffb82af60 a2=3 a3=0 items=0 ppid=1 pid=5035 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:34.968000 audit[5035]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffb82af60 a2=3 a3=0 items=0 ppid=1 pid=5035 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:34.968000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:52:34.978798 sshd[5035]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:52:34.980003 kernel: audit: type=1327 audit(1746838354.968:1545): proctitle=737368643A20636F7265205B707269765D May 10 00:52:34.986392 systemd[1]: Started session-25.scope. May 10 00:52:34.987130 systemd-logind[1179]: New session 25 of user core. May 10 00:52:34.993000 audit[5035]: USER_START pid=5035 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:34.999805 kernel: audit: type=1105 audit(1746838354.993:1546): pid=5035 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:35.002000 audit[5037]: CRED_ACQ pid=5037 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:35.006685 kernel: audit: type=1103 audit(1746838355.002:1547): pid=5037 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:35.324160 sshd[5035]: pam_unix(sshd:session): session closed for user core May 10 00:52:35.324000 audit[5035]: USER_END pid=5035 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:35.326000 audit[5035]: CRED_DISP pid=5035 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:35.330871 systemd[1]: sshd@24-146.190.154.235:22-139.178.68.195:50564.service: Deactivated successfully. May 10 00:52:35.331670 kernel: audit: type=1106 audit(1746838355.324:1548): pid=5035 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:35.331742 kernel: audit: type=1104 audit(1746838355.326:1549): pid=5035 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:35.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-146.190.154.235:22-139.178.68.195:50564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:35.332514 systemd[1]: session-25.scope: Deactivated successfully. May 10 00:52:35.333468 systemd-logind[1179]: Session 25 logged out. Waiting for processes to exit. May 10 00:52:35.334526 systemd-logind[1179]: Removed session 25. May 10 00:52:40.337716 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:52:40.337898 kernel: audit: type=1130 audit(1746838360.334:1551): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-146.190.154.235:22-139.178.68.195:59338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:40.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-146.190.154.235:22-139.178.68.195:59338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:40.335063 systemd[1]: Started sshd@25-146.190.154.235:22-139.178.68.195:59338.service. May 10 00:52:40.409000 audit[5075]: USER_ACCT pid=5075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:40.410355 sshd[5075]: Accepted publickey for core from 139.178.68.195 port 59338 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:52:40.421673 kernel: audit: type=1101 audit(1746838360.409:1552): pid=5075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:40.421000 audit[5075]: CRED_ACQ pid=5075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:40.426303 sshd[5075]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:52:40.427599 kernel: audit: type=1103 audit(1746838360.421:1553): pid=5075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:40.427759 kernel: audit: type=1006 audit(1746838360.422:1554): pid=5075 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 10 00:52:40.427802 kernel: audit: type=1300 audit(1746838360.422:1554): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb2e369c0 a2=3 a3=0 items=0 ppid=1 pid=5075 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:40.422000 audit[5075]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb2e369c0 a2=3 a3=0 items=0 ppid=1 pid=5075 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:40.431876 kernel: audit: type=1327 audit(1746838360.422:1554): proctitle=737368643A20636F7265205B707269765D May 10 00:52:40.422000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:52:40.433869 systemd[1]: Started session-26.scope. May 10 00:52:40.435859 systemd-logind[1179]: New session 26 of user core. May 10 00:52:40.442000 audit[5075]: USER_START pid=5075 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:40.445000 audit[5077]: CRED_ACQ pid=5077 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:40.451329 kernel: audit: type=1105 audit(1746838360.442:1555): pid=5075 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:40.451576 kernel: audit: type=1103 audit(1746838360.445:1556): pid=5077 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:40.687158 sshd[5075]: pam_unix(sshd:session): session closed for user core May 10 00:52:40.688000 audit[5075]: USER_END pid=5075 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:40.692718 kernel: audit: type=1106 audit(1746838360.688:1557): pid=5075 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:40.694000 audit[5075]: CRED_DISP pid=5075 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:40.698687 kernel: audit: type=1104 audit(1746838360.694:1558): pid=5075 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:40.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-146.190.154.235:22-139.178.68.195:59338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:40.701718 systemd-logind[1179]: Session 26 logged out. Waiting for processes to exit. May 10 00:52:40.701880 systemd[1]: sshd@25-146.190.154.235:22-139.178.68.195:59338.service: Deactivated successfully. May 10 00:52:40.703033 systemd[1]: session-26.scope: Deactivated successfully. May 10 00:52:40.704870 systemd-logind[1179]: Removed session 26. May 10 00:52:45.694519 systemd[1]: Started sshd@26-146.190.154.235:22-139.178.68.195:59276.service. May 10 00:52:45.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-146.190.154.235:22-139.178.68.195:59276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:45.696256 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:52:45.696350 kernel: audit: type=1130 audit(1746838365.694:1560): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-146.190.154.235:22-139.178.68.195:59276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:45.749000 audit[5100]: USER_ACCT pid=5100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:45.751394 sshd[5100]: Accepted publickey for core from 139.178.68.195 port 59276 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:52:45.754659 kernel: audit: type=1101 audit(1746838365.749:1561): pid=5100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:45.755000 audit[5100]: CRED_ACQ pid=5100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:45.756754 sshd[5100]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:52:45.759691 kernel: audit: type=1103 audit(1746838365.755:1562): pid=5100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:45.759802 kernel: audit: type=1006 audit(1746838365.755:1563): pid=5100 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 10 00:52:45.762535 kernel: audit: type=1300 audit(1746838365.755:1563): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7f3fdb70 a2=3 a3=0 items=0 ppid=1 pid=5100 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:45.765041 kernel: audit: type=1327 audit(1746838365.755:1563): proctitle=737368643A20636F7265205B707269765D May 10 00:52:45.755000 audit[5100]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7f3fdb70 a2=3 a3=0 items=0 ppid=1 pid=5100 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:45.755000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:52:45.764184 systemd[1]: Started session-27.scope. May 10 00:52:45.765491 systemd-logind[1179]: New session 27 of user core. May 10 00:52:45.771000 audit[5100]: USER_START pid=5100 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:45.773000 audit[5102]: CRED_ACQ pid=5102 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:45.778832 kernel: audit: type=1105 audit(1746838365.771:1564): pid=5100 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:45.778971 kernel: audit: type=1103 audit(1746838365.773:1565): pid=5102 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:45.923788 sshd[5100]: pam_unix(sshd:session): session closed for user core May 10 00:52:45.924000 audit[5100]: USER_END pid=5100 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:45.924000 audit[5100]: CRED_DISP pid=5100 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:45.928746 systemd[1]: sshd@26-146.190.154.235:22-139.178.68.195:59276.service: Deactivated successfully. May 10 00:52:45.929709 systemd[1]: session-27.scope: Deactivated successfully. May 10 00:52:45.932727 kernel: audit: type=1106 audit(1746838365.924:1566): pid=5100 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:45.932863 kernel: audit: type=1104 audit(1746838365.924:1567): pid=5100 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:45.932868 systemd-logind[1179]: Session 27 logged out. Waiting for processes to exit. May 10 00:52:45.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-146.190.154.235:22-139.178.68.195:59276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:45.934393 systemd-logind[1179]: Removed session 27. May 10 00:52:50.933515 systemd[1]: Started sshd@27-146.190.154.235:22-139.178.68.195:59288.service. May 10 00:52:50.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-146.190.154.235:22-139.178.68.195:59288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:50.935653 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:52:50.935749 kernel: audit: type=1130 audit(1746838370.933:1569): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-146.190.154.235:22-139.178.68.195:59288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:50.997000 audit[5130]: USER_ACCT pid=5130 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:51.001780 sshd[5130]: Accepted publickey for core from 139.178.68.195 port 59288 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:52:51.002839 kernel: audit: type=1101 audit(1746838370.997:1570): pid=5130 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:51.002000 audit[5130]: CRED_ACQ pid=5130 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:51.005198 sshd[5130]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:52:51.010556 kernel: audit: type=1103 audit(1746838371.002:1571): pid=5130 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:51.010747 kernel: audit: type=1006 audit(1746838371.003:1572): pid=5130 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 May 10 00:52:51.003000 audit[5130]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa6de6100 a2=3 a3=0 items=0 ppid=1 pid=5130 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:51.014994 kernel: audit: type=1300 audit(1746838371.003:1572): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa6de6100 a2=3 a3=0 items=0 ppid=1 pid=5130 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:51.015160 kernel: audit: type=1327 audit(1746838371.003:1572): proctitle=737368643A20636F7265205B707269765D May 10 00:52:51.003000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:52:51.019726 systemd[1]: Started session-28.scope. May 10 00:52:51.020379 systemd-logind[1179]: New session 28 of user core. May 10 00:52:51.032000 audit[5130]: USER_START pid=5130 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:51.036920 kernel: audit: type=1105 audit(1746838371.032:1573): pid=5130 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:51.037000 audit[5132]: CRED_ACQ pid=5132 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:51.041762 kernel: audit: type=1103 audit(1746838371.037:1574): pid=5132 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:51.197409 sshd[5130]: pam_unix(sshd:session): session closed for user core May 10 00:52:51.199000 audit[5130]: USER_END pid=5130 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:51.207005 kernel: audit: type=1106 audit(1746838371.199:1575): pid=5130 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:51.200000 audit[5130]: CRED_DISP pid=5130 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:51.211697 kernel: audit: type=1104 audit(1746838371.200:1576): pid=5130 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:51.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-146.190.154.235:22-139.178.68.195:59288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:51.209579 systemd[1]: sshd@27-146.190.154.235:22-139.178.68.195:59288.service: Deactivated successfully. May 10 00:52:51.210801 systemd[1]: session-28.scope: Deactivated successfully. May 10 00:52:51.213345 systemd-logind[1179]: Session 28 logged out. Waiting for processes to exit. May 10 00:52:51.215033 systemd-logind[1179]: Removed session 28. May 10 00:52:56.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-146.190.154.235:22-139.178.68.195:49164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:56.205068 systemd[1]: Started sshd@28-146.190.154.235:22-139.178.68.195:49164.service. May 10 00:52:56.206652 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:52:56.206723 kernel: audit: type=1130 audit(1746838376.204:1578): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-146.190.154.235:22-139.178.68.195:49164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:56.269000 audit[5143]: USER_ACCT pid=5143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:56.270422 sshd[5143]: Accepted publickey for core from 139.178.68.195 port 49164 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:52:56.274677 kernel: audit: type=1101 audit(1746838376.269:1579): pid=5143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:56.275000 audit[5143]: CRED_ACQ pid=5143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:56.277146 sshd[5143]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:52:56.282439 kernel: audit: type=1103 audit(1746838376.275:1580): pid=5143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:56.282576 kernel: audit: type=1006 audit(1746838376.275:1581): pid=5143 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 May 10 00:52:56.275000 audit[5143]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe392e0480 a2=3 a3=0 items=0 ppid=1 pid=5143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:56.289168 kernel: audit: type=1300 audit(1746838376.275:1581): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe392e0480 a2=3 a3=0 items=0 ppid=1 pid=5143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:56.289408 kernel: audit: type=1327 audit(1746838376.275:1581): proctitle=737368643A20636F7265205B707269765D May 10 00:52:56.275000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:52:56.291034 systemd-logind[1179]: New session 29 of user core. May 10 00:52:56.292222 systemd[1]: Started session-29.scope. May 10 00:52:56.299000 audit[5143]: USER_START pid=5143 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:56.304761 kernel: audit: type=1105 audit(1746838376.299:1582): pid=5143 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:56.306231 kernel: audit: type=1103 audit(1746838376.304:1583): pid=5145 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:56.304000 audit[5145]: CRED_ACQ pid=5145 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:56.458240 sshd[5143]: pam_unix(sshd:session): session closed for user core May 10 00:52:56.459000 audit[5143]: USER_END pid=5143 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:56.463648 kernel: audit: type=1106 audit(1746838376.459:1584): pid=5143 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:56.459000 audit[5143]: CRED_DISP pid=5143 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:56.465026 systemd[1]: sshd@28-146.190.154.235:22-139.178.68.195:49164.service: Deactivated successfully. May 10 00:52:56.466027 systemd[1]: session-29.scope: Deactivated successfully. May 10 00:52:56.467743 kernel: audit: type=1104 audit(1746838376.459:1585): pid=5143 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:52:56.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-146.190.154.235:22-139.178.68.195:49164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:56.470168 systemd-logind[1179]: Session 29 logged out. Waiting for processes to exit. May 10 00:52:56.471437 systemd-logind[1179]: Removed session 29. May 10 00:52:59.921584 kubelet[1925]: E0510 00:52:59.921483 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:52:59.924867 kubelet[1925]: E0510 00:52:59.924838 1925 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2"